Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 15:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe
-
Size
288KB
-
MD5
fb4c18480dd15904e8a452f9b3f198c8
-
SHA1
3e2af18484ba0f03a2e7f312100fd6da5760661e
-
SHA256
f375f846f74202c26c8c98f67d6270d37eb401375d455af0d502f14fb9ad2869
-
SHA512
90b0ea5c6c2ef445545f40b4da6ba3d90899934ff00ee0e50b55cfa8272aa45cae93cdce63b69a9a44523493a50cdb48ff199556b707594de03083409b608995
-
SSDEEP
6144:cQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:cQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
SearchIndexerDB.exeSearchIndexerDB.exepid process 2804 SearchIndexerDB.exe 2576 SearchIndexerDB.exe -
Loads dropped DLL 4 IoCs
Processes:
2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exeSearchIndexerDB.exepid process 2312 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe 2312 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe 2312 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe 2804 SearchIndexerDB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
Processes:
2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\ = "cmos" 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\runas 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\cmos\shell 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\cmos\shell\runas 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\cmos\shell\runas\command\ = "\"%1\" %*" 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\open 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\cmos 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\cmos\shell\runas\command 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\open\command 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\cmos\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\SearchIndexerDB.exe\" /START \"%1\" %*" 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\cmos\shell\open 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\cmos\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\cmos\shell\open\command 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\SearchIndexerDB.exe\" /START \"%1\" %*" 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\cmos\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\runas\command 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\cmos\ = "Application" 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\cmos\Content-Type = "application/x-msdownload" 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\DefaultIcon 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\cmos\DefaultIcon 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\cmos\DefaultIcon\ = "%1" 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SearchIndexerDB.exedescription pid process Token: SeIncBasePriorityPrivilege 2804 SearchIndexerDB.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exeSearchIndexerDB.exedescription pid process target process PID 2312 wrote to memory of 2804 2312 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe SearchIndexerDB.exe PID 2312 wrote to memory of 2804 2312 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe SearchIndexerDB.exe PID 2312 wrote to memory of 2804 2312 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe SearchIndexerDB.exe PID 2312 wrote to memory of 2804 2312 2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe SearchIndexerDB.exe PID 2804 wrote to memory of 2576 2804 SearchIndexerDB.exe SearchIndexerDB.exe PID 2804 wrote to memory of 2576 2804 SearchIndexerDB.exe SearchIndexerDB.exe PID 2804 wrote to memory of 2576 2804 SearchIndexerDB.exe SearchIndexerDB.exe PID 2804 wrote to memory of 2576 2804 SearchIndexerDB.exe SearchIndexerDB.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_fb4c18480dd15904e8a452f9b3f198c8_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exe"3⤵
- Executes dropped EXE
PID:2576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exeFilesize
256KB
MD566695418c60b9574ee8bd6d246a56425
SHA13e8a825577ac9558c9158b01a9327bf6911405fd
SHA25695fc8a2efb64656ba3148d796066762de15ca3dd77474bf73caaaaf7d01356d8
SHA51259ffb5b823c86c2fc6a22645879caa124ee472aa4b243d480dbc2027cea60823afa2613696898cadfe2e29e64a17c52bc599db22978c344a5d86dfa373964703
-
C:\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exeFilesize
91KB
MD5dc7346e89581edfa1b7cf7ecc8886ca7
SHA1cbb1df763ae106cbd2e8e4d48acda0bf2b42825a
SHA256d1c21cc68fbe2207c2b8b775a5e9c4f801a78663c4dafa7f389d811e0eb330a8
SHA512d2978d88b21e48fe91863af06c0613c4c5c4c1b0785b1bc2c04c29b73e52bb47ad3e68ec029c7ffed28db6e9f18b680c2d3cd5a31c3b0679f5071b264400a250
-
\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exeFilesize
288KB
MD590ac4cddacc3559088480c45df719183
SHA1c9b528093672841a8dc1265cf12420dad0069cad
SHA256b60f93a0223222ee3cfed82236d46049bd2960c5929296b68d97202827937ff9
SHA51231edc9b8d19e4c69918a158ccf3aa9523b7d1a3d932dc18230e1c7c3ebe55f0803dd8e9b50b9b1e220780b9ac7c4f608e16fb4cefc3bc81be25dc9b323a3d07e
-
\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exeFilesize
179KB
MD501850944a89f56376f195f86bfaeb06a
SHA1b4fe4032455dd13ba090973add1869663811b17f
SHA256afe0d64db7bcd8aefe7cd0a91c158da817c26af24170fbf62d452b59c9e8e52a
SHA5128fecffdbcaf4ea8c8c165509ef2e5a743648dbfccdadc986ef78a4555a7d874af842f50b6f54cffe7901d03a83d96bffede82b569683b35166864e8b21fa120b
-
\Users\Admin\AppData\Roaming\Microsoft\SView\SearchIndexerDB.exeFilesize
128KB
MD52ab2e6b73367b8f568ebaa426c4b647d
SHA187b217d3cf71bba6b5850c5faa6c31bf90a89303
SHA256681936f5df99189577a30c639cb77fd76c2467890736ace905eaf9f61028ac71
SHA512ebde507ab02380c0eec5b5208e41c093702f19800a2d0746eb4f920e970779380cda00c2356b4a7e677666f62857cc7488d2aaf65a98a283f0ae169d34dcfc85