Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/02/2024, 17:03

General

  • Target

    2024-02-21_928357232675420d8f9f981577b2a163_mafia_nionspy.exe

  • Size

    327KB

  • MD5

    928357232675420d8f9f981577b2a163

  • SHA1

    19c442b319a48297a999c6473db09efb05346f76

  • SHA256

    e93267381a5aa51413b5bfef8dc88e42e88e6709206a4a01b05e01172c552034

  • SHA512

    aebeedfdc981f1a4de9615bc0566b04636c0c9a4248af0f0f2f5a25bd897ddc2ec8ab5866edb0be25208ac457202c6ca9d2c1d5aa1dde85ed91f82b9732b5918

  • SSDEEP

    6144:k2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:k2TFafJiHCWBWPMjVWrXK0

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-21_928357232675420d8f9f981577b2a163_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-21_928357232675420d8f9f981577b2a163_mafia_nionspy.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4220
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe"
        3⤵
        • Executes dropped EXE
        PID:5048

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe

          Filesize

          327KB

          MD5

          8f987d758eacf53e1ea899f9d3589a8a

          SHA1

          5ba79a81e570785eead1fe7b6f26161e5385cc76

          SHA256

          dca61ecc75251a23001558d9b3ce75d8a8cbd3cfd83889c7cf7088e263204cb6

          SHA512

          3df3341902a0d41bde35c8250d9c96d3386b0c44b80e07accd7e726fac7b2ff526d50652446924b31960cecd0731e3a838f18e80d19bce886a4cbc1c9c128baa