Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe
-
Size
288KB
-
MD5
57cc69f1531d6e9e59bb86b507d25142
-
SHA1
dc74f73576ab35d7109021402df9958edcc68f63
-
SHA256
94354463bfa6788e255cd863e16920c969413b9f11e6169a07a4627a76db2c21
-
SHA512
c0fce2ce65456f8f8d590db133ccaa7f95f65b71bc6db1d4851c007e89b881522de5decb5483755167c97c412c129d72abdbf21c3bafa913d4bd5232ecff7287
-
SSDEEP
6144:9Q+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:9QMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3032 winit32.exe 1632 winit32.exe -
Loads dropped DLL 3 IoCs
pid Process 1636 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe 1636 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe 1636 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\ntdriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\winit32.exe\" /START \"%1\" %*" 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell\open 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\ntdriver\DefaultIcon\ = "%1" 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\ntdriver\shell\runas\command 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\DefaultIcon 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\ntdriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\ntdriver\ = "Application" 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\ntdriver\Content-Type = "application/x-msdownload" 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\ntdriver\shell\open\command 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\ntdriver\shell 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\ntdriver 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\winit32.exe\" /START \"%1\" %*" 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell\runas 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\ntdriver\shell\runas\command\ = "\"%1\" %*" 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell\open\command 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\ = "ntdriver" 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\shell\runas\command 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\ntdriver\DefaultIcon 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\ntdriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\ntdriver\shell\open 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\ntdriver\shell\runas 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3032 winit32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1636 wrote to memory of 3032 1636 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe 28 PID 1636 wrote to memory of 3032 1636 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe 28 PID 1636 wrote to memory of 3032 1636 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe 28 PID 1636 wrote to memory of 3032 1636 2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe 28 PID 3032 wrote to memory of 1632 3032 winit32.exe 29 PID 3032 wrote to memory of 1632 3032 winit32.exe 29 PID 3032 wrote to memory of 1632 3032 winit32.exe 29 PID 3032 wrote to memory of 1632 3032 winit32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_57cc69f1531d6e9e59bb86b507d25142_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\winit32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\winit32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\winit32.exe"3⤵
- Executes dropped EXE
PID:1632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5e61e535473bcf9c73b0172955ee9079b
SHA14ae6e0aaaec9d9ce1d0060c76481324abce8f050
SHA2564b77a914cb59fba9ecc78b5a07701d0610b08d07fd4c24e9189f1bbce4df321b
SHA51271fb9a484f42da173018cabf7604461177e070b39d35adc547d10848350d4992abc4293f856e6ed4a67368c4a9885e7af4bb73f52ac1b5c7be2a41d9eb2c869a