Analysis

  • max time kernel
    122s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2024, 01:26

General

  • Target

    2024-01-27_5122529815fbaa316255966e87becab6_mafia_nionspy.exe

  • Size

    327KB

  • MD5

    5122529815fbaa316255966e87becab6

  • SHA1

    9ebb8604e0222b8d0aed7c151314666e7468bbc8

  • SHA256

    9488557b48f89bf068b106f0ec329e8761cc736f742916380d771f05f3ac83c3

  • SHA512

    bf9c7db7434f21a2c6c4dc0973c7b8d43cf865bc690c8d084d609b828fcb2dd31e88fd12c5bae32d711bd1192e3af866d4ee2d8a29a1caaf672b4ac6f3099313

  • SSDEEP

    6144:p2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:p2TFafJiHCWBWPMjVWrXK0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-27_5122529815fbaa316255966e87becab6_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-27_5122529815fbaa316255966e87becab6_mafia_nionspy.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\sidebar2.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\sidebar2.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\sidebar2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\sidebar2.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\sidebar2.exe"
        3⤵
        • Executes dropped EXE
        PID:2764

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\sidebar2.exe

          Filesize

          327KB

          MD5

          d789c9bb72ea4e9bb3c2b0a9f441a2f4

          SHA1

          a65c428a770c18e0fbe1a4ed3535de3eab28a782

          SHA256

          2b6c540e9933cadf23029e0884cca8507a76ff2377898d8901f621d99c54f998

          SHA512

          7c579258d9359f4309642ae0047273b7dc019f5a82740d2360a20bfc25eee6d81c689c7286583dd13c4bca8918f5faf84b7fa8d57715ccf2d41cda2c97ceca94