Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 01:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe
Resource
win10v2004-20240221-en
General
-
Target
2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe
-
Size
344KB
-
MD5
f92b1e5b0208625c150c3a59a78e4014
-
SHA1
545f7c7ff142a4359704ece07f157af80a020cd3
-
SHA256
9b655e89346579c9d3c77f330d96e46d6671789ef94320b94c1d22703aecf649
-
SHA512
b4a71d2e7c641aec7f8777b6d5c3a228c517c2503fcabc68ea0ad639a0bbddbd930e3c0be32bae21405c290820844e43b0edc83496e6b0d769c9b14d2534bb22
-
SSDEEP
6144:3ITz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDBRm1+gmN:4TBPFV0RyWl3h2E+7pYm0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 3260 sidebar2.exe 2080 sidebar2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\prochost\ = "Application" 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\.exe\shell 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\.exe\shell\runas\command 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\prochost\shell\runas\command 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\.exe\shell\open\command 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\.exe\shell\open 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\sidebar2.exe\" /START \"%1\" %*" 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\.exe\shell\runas 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\prochost\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\sidebar2.exe\" /START \"%1\" %*" 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\prochost\shell\open\command 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\prochost\shell\open 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\prochost\DefaultIcon 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\prochost\shell\runas 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\.exe\DefaultIcon 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\prochost\Content-Type = "application/x-msdownload" 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\prochost\DefaultIcon\ = "%1" 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\prochost\shell 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\prochost\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\prochost\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\.exe\ = "prochost" 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\prochost 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\prochost\shell\runas\command\ = "\"%1\" %*" 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\.exe 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\Local Settings 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3260 sidebar2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4636 wrote to memory of 3260 4636 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe 86 PID 4636 wrote to memory of 3260 4636 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe 86 PID 4636 wrote to memory of 3260 4636 2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe 86 PID 3260 wrote to memory of 2080 3260 sidebar2.exe 85 PID 3260 wrote to memory of 2080 3260 sidebar2.exe 85 PID 3260 wrote to memory of 2080 3260 sidebar2.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-25_f92b1e5b0208625c150c3a59a78e4014_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\sidebar2.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\sidebar2.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3260
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\sidebar2.exe"1⤵
- Executes dropped EXE
PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD55d9ff7558468eb735ea6dd2b1dbce738
SHA10659d0b9d10c1ae08445146ad61d6512cb48759a
SHA2568599a8080c669ed9aced7834683bd78a70ab6a66155c51781a5c499fb77ae696
SHA51212b8eeaedec82621563de63827049d1102776333aa67591e11728c88e6c637fc08a506af0ad1a8b2aee175d437c5c44644e679299746381ec45491cdbe15cb71
-
Filesize
29KB
MD5b3b249d4ebc6d08f697b5625bbaa52d2
SHA10a1ea193c5a170f047bf7d8ae179441dbdb34990
SHA256841f7c06c8bd6a68be6a912f68816e0d24f890ee9c75097b4ddf10a588018541
SHA5129a01b40746413391403d9673c65df25996ef5d8329df4ae4085573d5f75cfbdc162fc2ef5d3ca5c5ed00fab30666512aad94a5fdf51abb406bbf6e2c7e88f7a0
-
Filesize
12KB
MD5d6dca49512311846ac82ced5afcf09b3
SHA18e062e7670b77780e503582c5f58e0ade1c0ad94
SHA256a1717988e63ac1e680366b5ec23e9ad88f8dc542ec4e27d3f76caa1426a25b4f
SHA5120f1541942f40bf1217ecf9667847af921c9d00cf55d1ff2d4ce61aee2da12382c4f43cc4f80dba7b445b4aa14e1afa067d2657240012be3a65be41248b6f00f1