Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/01/2024, 15:31

General

  • Target

    2024-01-28_bfd2b0ce271fed0334758dd9f55f06f5_mafia_nionspy.exe

  • Size

    344KB

  • MD5

    bfd2b0ce271fed0334758dd9f55f06f5

  • SHA1

    ef70a6437c26dedf161c1bfe66abe33a5b948f0f

  • SHA256

    056119118c4c5d0373ad66dded0224c6676fbf874e420d0bb4ec0705ff89c224

  • SHA512

    d82758fb41c78d5da316fc99ab3dd5ce99467c6cd283692a940c9378efcf3438d5a361bce967b511c5c632e3c586a5855b423573b0a2a90a2facf8d774a9efc4

  • SSDEEP

    6144:UTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDBRm1+gmN:UTBPFV0RyWl3h2E+7pYm0

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-28_bfd2b0ce271fed0334758dd9f55f06f5_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-28_bfd2b0ce271fed0334758dd9f55f06f5_mafia_nionspy.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3112
    • C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\csrssys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\csrssys.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3644
      • C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\csrssys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\csrssys.exe"
        3⤵
        • Executes dropped EXE
        PID:1136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\csrssys.exe

    Filesize

    344KB

    MD5

    8c1c7392075ac8ed0b4dd4f4d24be386

    SHA1

    72e54542d0df1a1ddc39738bcac68f08eccf72ef

    SHA256

    71e005331dbc25fccebbfa74967bbe6bba4abc43cfabc9a039ab58e86bbd1420

    SHA512

    b51706317d877555b1ba1c4ab0b0857de05ffb1acd332019381b45ab23d9c19bbb7e17c55cf0122471bf9563f82f4ecd8f199818b84e3010c5afe5dcb409d934