Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:29
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe
-
Size
328KB
-
MD5
5f2c102935c23cf33aa765c39be7fa7f
-
SHA1
37b52c14e3193c98dd189886e87692e94507086f
-
SHA256
0d9682e6947e783ee05eb3b52bbfd574803b5c9a0a28838fa9337dda8715c054
-
SHA512
aacb5e28d9f54628cb93894dc9965a67f81610d3b6cc5a5ea91632fa9fd564c7086145bbcbed6d0762964873f4c986bc198f17ba9426fab97f606ee59f0e7a4e
-
SSDEEP
6144:22+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG89gkPzDh1v:22TFafJiHCWBWPMjVWrXf1v
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 3632 wlogon32.exe 4128 wlogon32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\haldriver\Content-Type = "application/x-msdownload" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\haldriver\shell 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\.exe\shell\runas 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\haldriver\ = "Application" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\haldriver 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\wlogon32.exe\" /START \"%1\" %*" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\haldriver\shell\open\command 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\haldriver\shell\runas 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\haldriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\.exe 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\.exe\shell 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\.exe\shell\open 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\haldriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\wlogon32.exe\" /START \"%1\" %*" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\haldriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\haldriver\shell\open 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\.exe\shell\runas\command 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\.exe\DefaultIcon 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\.exe\shell\open\command 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\haldriver\DefaultIcon 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\haldriver\DefaultIcon\ = "%1" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\haldriver\shell\runas\command 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\haldriver\shell\runas\command\ = "\"%1\" %*" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\.exe\ = "haldriver" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3632 wlogon32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4436 wrote to memory of 3632 4436 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe 88 PID 4436 wrote to memory of 3632 4436 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe 88 PID 4436 wrote to memory of 3632 4436 2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe 88 PID 3632 wrote to memory of 4128 3632 wlogon32.exe 89 PID 3632 wrote to memory of 4128 3632 wlogon32.exe 89 PID 3632 wrote to memory of 4128 3632 wlogon32.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_5f2c102935c23cf33aa765c39be7fa7f_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\wlogon32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\wlogon32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\wlogon32.exe"3⤵
- Executes dropped EXE
PID:4128
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD5d32ab8dccc75a9365c76dd29061a4ef9
SHA1744f1deeb2eafb43ba54d05e248e7dea8b07e58c
SHA256a12eeccdc7193d41c85ced0f32a8013ec954b1d02a7dd0a1cde1f2920c7339c0
SHA512793fb6e17f2c78fb374b1cf458badd9a84b845272835818a70f905e3ada094b3129fff2731f1f711ed9f18e0fe21d7ba38cbf8b9508d56274df7f9c48a281a8d