Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe
-
Size
328KB
-
MD5
5f2c102935c23cf33aa765c39be7fa7f
-
SHA1
37b52c14e3193c98dd189886e87692e94507086f
-
SHA256
0d9682e6947e783ee05eb3b52bbfd574803b5c9a0a28838fa9337dda8715c054
-
SHA512
aacb5e28d9f54628cb93894dc9965a67f81610d3b6cc5a5ea91632fa9fd564c7086145bbcbed6d0762964873f4c986bc198f17ba9426fab97f606ee59f0e7a4e
-
SSDEEP
6144:22+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG89gkPzDh1v:22TFafJiHCWBWPMjVWrXf1v
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2804 wlogon32.exe 2600 wlogon32.exe -
Loads dropped DLL 4 IoCs
pid Process 2864 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe 2864 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe 2864 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe 2804 wlogon32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.exe\ = "haldriver" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.exe\shell\open 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\haldriver\shell 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\haldriver\shell\runas\command\ = "\"%1\" %*" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\haldriver\shell\runas\command 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.exe\shell\runas\command 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.exe\shell\runas 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\haldriver\DefaultIcon\ = "%1" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\haldriver\shell\open\command 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\haldriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.exe\shell\open\command 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\haldriver\shell\open 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.exe\DefaultIcon 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\haldriver\Content-Type = "application/x-msdownload" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\haldriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\wlogon32.exe\" /START \"%1\" %*" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\haldriver\ = "Application" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\haldriver\DefaultIcon 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.exe 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.exe\shell 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\haldriver 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\haldriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\wlogon32.exe\" /START \"%1\" %*" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\haldriver\shell\runas 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2804 wlogon32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2804 2864 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe 28 PID 2864 wrote to memory of 2804 2864 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe 28 PID 2864 wrote to memory of 2804 2864 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe 28 PID 2864 wrote to memory of 2804 2864 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe 28 PID 2804 wrote to memory of 2600 2804 wlogon32.exe 29 PID 2804 wrote to memory of 2600 2804 wlogon32.exe 29 PID 2804 wrote to memory of 2600 2804 wlogon32.exe 29 PID 2804 wrote to memory of 2600 2804 wlogon32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\wlogon32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\wlogon32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\wlogon32.exe"3⤵
- Executes dropped EXE
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD59f940d21551f40c5bf5ff7563a6a84d1
SHA14671f8331a8491d67cc107acc23b465322ba6988
SHA2561b0627cd84575551a1fa97966eb6bfde5333299733de2f0e37f44c3ca2ab9159
SHA51255fd811f0acc9e399586f3725e7b25936458568d7139a6c037d66ce669516285c09706b1d8b68e72beee4b3b09106d3132e84bd432a229fc519e1a36937cd738