Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe
-
Size
327KB
-
MD5
980385ee528eebd61793de6d494e1764
-
SHA1
47aee091743777a3cb14491a600dcfc7edd0608d
-
SHA256
0c8e142a5867c9e82db61661f3825eea1c188d8ec9b3617f3fab2cf037314bdb
-
SHA512
1f8caae61d79a3b94d473bee583ebba7b638f953358b16d5ecd2292f0dbfed20cff0fd71004e193558addd7ef364df8f9943d4f44958958230134dd63cd56751
-
SSDEEP
6144:i2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:i2TFafJiHCWBWPMjVWrXK0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 3448 winit32.exe 4696 winit32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\DefaultIcon\ = "%1" 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\winit32.exe\" /START \"%1\" %*" 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\ = "ntdriver" 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\winit32.exe\" /START \"%1\" %*" 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\open\command 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\runas\command 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\runas 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\ = "Application" 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\DefaultIcon 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\Content-Type = "application/x-msdownload" 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\DefaultIcon 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\open 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\runas\command\ = "\"%1\" %*" 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3448 winit32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 748 wrote to memory of 3448 748 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe 97 PID 748 wrote to memory of 3448 748 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe 97 PID 748 wrote to memory of 3448 748 2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe 97 PID 3448 wrote to memory of 4696 3448 winit32.exe 98 PID 3448 wrote to memory of 4696 3448 winit32.exe 98 PID 3448 wrote to memory of 4696 3448 winit32.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-07_980385ee528eebd61793de6d494e1764_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\winit32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SView\winit32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\winit32.exe"3⤵
- Executes dropped EXE
PID:4696
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5240 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:81⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD5c9ed35a326aba41cb2b73a09fda593e9
SHA1630d76fa1b16e48f72271abda37fa2103c78e204
SHA256a2cb6d4d29436c5ba83bf29bd24e43a8878e7bf4f4f8706a0a75fadd17ace202
SHA5121f41fc9c5bf208ba693e907d5e196d1773a06392bb59602fe7c5c582570ed556b1f644831c2b04fc7c43a1d7b4e6d6d63600e44daa44ba83e0f7e8854ef30519