Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 03:39

General

  • Target

    2024-01-25_f6bc90bdfa280a466ad82017d025cb7e_mafia_nionspy.exe

  • Size

    280KB

  • MD5

    f6bc90bdfa280a466ad82017d025cb7e

  • SHA1

    3c7e45ed690a7c2e65d6c4e457b26263b2a4333b

  • SHA256

    659d9830dd88baba33dee02771da601c7f7696accb1ab52192ac26225e37f8fb

  • SHA512

    2cc8d87ee6e87213078c764df618ad3faf5bbb6d3218c6fe345373b7cb577fce2fd915a6536e6da9243b2232a60d7ac23882606d44d5ec830d9b4c796726c092

  • SSDEEP

    6144:9Tz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:9TBPFV0RyWl3h2E+7pl

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-25_f6bc90bdfa280a466ad82017d025cb7e_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-25_f6bc90bdfa280a466ad82017d025cb7e_mafia_nionspy.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe"
        3⤵
        • Executes dropped EXE
        PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe

    Filesize

    280KB

    MD5

    65297d5b906321d598b18cf81938bca9

    SHA1

    257ec71b2500a8ee00c4e551cce36e7a7250d6bd

    SHA256

    da020bbbcd2e344cc7197b62ca8515c98a67eec18e35bb2fa4483e34ac875c55

    SHA512

    01ba84eae0bf8ffc13edb9b7f3766e5537ae99cb35ee7b5cb0df614402f2f32d91e37b740e8100a08aa5d6594a4515bde85debdc55e84893984ebf2bd8311768