Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe
-
Size
288KB
-
MD5
248a083e93846666d4e63d6e00226eec
-
SHA1
a763b70ae8a69e62dd1c52a981c653de9c769170
-
SHA256
f9bce04dc1c440e38272e3ae9c32f6ac1c70b1a682bd4e2c336f883d371f2be8
-
SHA512
0335615cf6b258de550912663fbe30c0fdf0db10c6532f45187e66073835a871f45574d17c19710869a33055f352d83f735b819fadd9e14ffca71464d5bcf89e
-
SSDEEP
6144:JQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:JQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 836 csrssys.exe 3176 csrssys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\wexplorer\DefaultIcon 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell\runas 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\wexplorer\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell\open\command 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell\runas\command 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\wexplorer\shell\open\command 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\wexplorer\DefaultIcon\ = "%1" 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\wexplorer\shell 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\wexplorer\shell\open 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\wexplorer\shell\runas\command 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\ = "wexplorer" 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell\open 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\wexplorer 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\csrssys.exe\" /START \"%1\" %*" 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\wexplorer\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\wexplorer\Content-Type = "application/x-msdownload" 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\wexplorer\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\csrssys.exe\" /START \"%1\" %*" 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\wexplorer\shell\runas 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\wexplorer\shell\runas\command\ = "\"%1\" %*" 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\DefaultIcon 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\wexplorer\ = "Application" 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 836 csrssys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1680 wrote to memory of 836 1680 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe 85 PID 1680 wrote to memory of 836 1680 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe 85 PID 1680 wrote to memory of 836 1680 2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe 85 PID 836 wrote to memory of 3176 836 csrssys.exe 86 PID 836 wrote to memory of 3176 836 csrssys.exe 86 PID 836 wrote to memory of 3176 836 csrssys.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-09_248a083e93846666d4e63d6e00226eec_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"3⤵
- Executes dropped EXE
PID:3176
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5cfc671af297dd98b071d5b476f28c250
SHA13ebfde008342ca1b9799688fb289b4773f1142e8
SHA256c8bd73418fb549f9258a79dbb272b9be46f317e69e6b92916019a730dcecbb61
SHA512993ba2d79735880bad992ca7ab5a9c9e47c26f9cada2acf2c23747dd20fc998bcee6ff659ff02dd5973febc05accafe24665c375dee379c51ef5935f8dd2388e