Analysis
-
max time kernel
122s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 14:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe
-
Size
288KB
-
MD5
bf5d1254432452c992ccfa26e463a4bf
-
SHA1
e11c008a9fef9e432e2aa99c2aecf2bb6acb5711
-
SHA256
4a67917e897e4d86e9f83712078658fec85618e418727c197e11c1d77f7798c6
-
SHA512
f746f83afdee240716e35d121845de5eb84e347842c41549bde0c5b218ba9f81bc009d83cae4718b0737fdd89c0e63313aba78944389901a599b07fbe712454c
-
SSDEEP
6144:sQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:sQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2696 taskhostsys.exe 2708 taskhostsys.exe -
Loads dropped DLL 3 IoCs
pid Process 2164 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe 2164 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe 2164 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell\runas\command 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\DefaultIcon 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell\runas 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\jitc\DefaultIcon 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\jitc\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\jitc\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\jitc\DefaultIcon\ = "%1" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\jitc\shell\runas 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\taskhostsys.exe\" /START \"%1\" %*" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\jitc\shell\runas\command 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\ = "jitc" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\jitc\shell\open 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\jitc\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\taskhostsys.exe\" /START \"%1\" %*" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\jitc 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\jitc\Content-Type = "application/x-msdownload" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\jitc\shell\runas\command\ = "\"%1\" %*" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell\open\command 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\jitc\ = "Application" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\jitc\shell\open\command 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\jitc\shell 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000_CLASSES\.exe\shell\open 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2696 taskhostsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2696 2164 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe 28 PID 2164 wrote to memory of 2696 2164 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe 28 PID 2164 wrote to memory of 2696 2164 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe 28 PID 2164 wrote to memory of 2696 2164 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe 28 PID 2696 wrote to memory of 2708 2696 taskhostsys.exe 29 PID 2696 wrote to memory of 2708 2696 taskhostsys.exe 29 PID 2696 wrote to memory of 2708 2696 taskhostsys.exe 29 PID 2696 wrote to memory of 2708 2696 taskhostsys.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\taskhostsys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\taskhostsys.exe"3⤵
- Executes dropped EXE
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD53a4edd3fee5818f6ab1e13c4f105454d
SHA12e95c715ac2374abed26aa88cb7fd2dbc4b99fd6
SHA256ab42a5c1c1d2f5a7430d380ae7c1e38f8998681f2a9184452b3519be931397ec
SHA512f28f88ab73267303b1e6eff895756b823c403d406c41ce18be3eb0e2feb95807c8bd4ef27a424dee847dd4b73a5ca6cd9216a4afdcdc76d8596980efe0e3bc51