Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe
-
Size
280KB
-
MD5
6fc17186a834b8243764c173799fb15a
-
SHA1
ca012c7eb42fd1200b1560127d3cb61d0abebaca
-
SHA256
4d680a58630155b0b76c10b99b8e0a1ae9f69a92dda247f8e8544e824d97b44e
-
SHA512
79c7c70a84e412171aa23265da6c07ff116dfc61beafd329c6ca00bb176a479eb05250e50e3ea923146d37ff038b31aae306913764686d47540369c84c0c104d
-
SSDEEP
6144:SQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:SQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 2284 wlogon32.exe 4304 wlogon32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\Local Settings 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\open\command 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\Content-Type = "application/x-msdownload" 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\wlogon32.exe\" /START \"%1\" %*" 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\runas\command 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\runas 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\ = "Application" 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\DefaultIcon 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\DefaultIcon\ = "%1" 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\ = "haldriver" 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\DefaultIcon 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\open 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell\open 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\wlogon32.exe\" /START \"%1\" %*" 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell\runas\command 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell\open\command 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell\runas 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\haldriver\shell\runas\command\ = "\"%1\" %*" 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\.exe\shell 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2284 wlogon32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3836 wrote to memory of 2284 3836 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe 88 PID 3836 wrote to memory of 2284 3836 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe 88 PID 3836 wrote to memory of 2284 3836 2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe 88 PID 2284 wrote to memory of 4304 2284 wlogon32.exe 89 PID 2284 wrote to memory of 4304 2284 wlogon32.exe 89 PID 2284 wrote to memory of 4304 2284 wlogon32.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-23_6fc17186a834b8243764c173799fb15a_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\wlogon32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\wlogon32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\wlogon32.exe"3⤵
- Executes dropped EXE
PID:4304
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5af4ae7f66fc7703630da061cdd040d21
SHA1ee9e075885c679c4c0f2c66b2bdf932847f83ccf
SHA256dbcfcbfc2e6aca1938af81d2b3e099d018ccb5482bf2dd13422593e736b8663e
SHA512102fb6cb838ff6dabec64d604994344c5d6b8c5dc6892378076889b6cab45d181e70b83a5109efe1294904a979431adfa20e96cc728aaa0856f7233ceb091e77