Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 14:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe
-
Size
288KB
-
MD5
bf5d1254432452c992ccfa26e463a4bf
-
SHA1
e11c008a9fef9e432e2aa99c2aecf2bb6acb5711
-
SHA256
4a67917e897e4d86e9f83712078658fec85618e418727c197e11c1d77f7798c6
-
SHA512
f746f83afdee240716e35d121845de5eb84e347842c41549bde0c5b218ba9f81bc009d83cae4718b0737fdd89c0e63313aba78944389901a599b07fbe712454c
-
SSDEEP
6144:sQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:sQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 2304 taskhostsys.exe 4488 taskhostsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\jitc\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell\open\command 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell\runas\command 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\jitc 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\jitc\shell\runas\command 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell\open 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\jitc\shell\open 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\DefaultIcon 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell\runas 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\jitc\ = "Application" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\ = "jitc" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\jitc\DefaultIcon\ = "%1" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\jitc\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\jitc\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\taskhostsys.exe\" /START \"%1\" %*" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\jitc\shell\runas\command\ = "\"%1\" %*" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\jitc\Content-Type = "application/x-msdownload" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\jitc\shell\open\command 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\jitc\shell\runas 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\taskhostsys.exe\" /START \"%1\" %*" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\jitc\DefaultIcon 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\jitc\shell 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2304 taskhostsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4980 wrote to memory of 2304 4980 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe 85 PID 4980 wrote to memory of 2304 4980 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe 85 PID 4980 wrote to memory of 2304 4980 2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe 85 PID 2304 wrote to memory of 4488 2304 taskhostsys.exe 86 PID 2304 wrote to memory of 4488 2304 taskhostsys.exe 86 PID 2304 wrote to memory of 4488 2304 taskhostsys.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-10_bf5d1254432452c992ccfa26e463a4bf_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\taskhostsys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\taskhostsys.exe"3⤵
- Executes dropped EXE
PID:4488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD53a4edd3fee5818f6ab1e13c4f105454d
SHA12e95c715ac2374abed26aa88cb7fd2dbc4b99fd6
SHA256ab42a5c1c1d2f5a7430d380ae7c1e38f8998681f2a9184452b3519be931397ec
SHA512f28f88ab73267303b1e6eff895756b823c403d406c41ce18be3eb0e2feb95807c8bd4ef27a424dee847dd4b73a5ca6cd9216a4afdcdc76d8596980efe0e3bc51