Analysis
-
max time kernel
123s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe
-
Size
328KB
-
MD5
ac74375dc856be6c69426fa5bdc5beb1
-
SHA1
49f038a57dbc985932e0aa28c63b48cae3c2e1c0
-
SHA256
7e297ee79c74cf152cb71e453eb85636fa496ff3cd79b4f9b2b4ff3e363cd8f5
-
SHA512
e5ed6bebca1346be0cfdb0464e8895a63cb0e0843982a2a6bec1c2234c7b53685d82ead35321236450b73fe3b9db5e54c0aaec83db5eea43a6a1d5d273238486
-
SSDEEP
6144:Q2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG89gkPzDh1v:Q2TFafJiHCWBWPMjVWrXf1v
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2824 csrssys.exe 2596 csrssys.exe -
Loads dropped DLL 3 IoCs
pid Process 1332 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe 1332 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe 1332 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\csrssys.exe\" /START \"%1\" %*" 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell\runas\command 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\wexplorer\shell 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\wexplorer\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\csrssys.exe\" /START \"%1\" %*" 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\wexplorer\shell\runas 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\wexplorer\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\wexplorer 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\ = "wexplorer" 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\wexplorer\ = "Application" 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\wexplorer\Content-Type = "application/x-msdownload" 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\wexplorer\shell\runas\command\ = "\"%1\" %*" 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\DefaultIcon 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\wexplorer\shell\open\command 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\wexplorer\shell\open 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\wexplorer\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\wexplorer\shell\runas\command 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell\open\command 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\wexplorer\DefaultIcon 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\wexplorer\DefaultIcon\ = "%1" 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell\open 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000_CLASSES\.exe\shell\runas 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2824 csrssys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1332 wrote to memory of 2824 1332 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe 28 PID 1332 wrote to memory of 2824 1332 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe 28 PID 1332 wrote to memory of 2824 1332 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe 28 PID 1332 wrote to memory of 2824 1332 2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe 28 PID 2824 wrote to memory of 2596 2824 csrssys.exe 29 PID 2824 wrote to memory of 2596 2824 csrssys.exe 29 PID 2824 wrote to memory of 2596 2824 csrssys.exe 29 PID 2824 wrote to memory of 2596 2824 csrssys.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-11_ac74375dc856be6c69426fa5bdc5beb1_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\csrssys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\csrssys.exe"3⤵
- Executes dropped EXE
PID:2596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD536aff14d88879bd86efa31eb108214fc
SHA17b9f42bb8f14b421dcbca7821f2f19ebfa52d9be
SHA25614a3d95f1da6e112401adea811e6d249184cb024bb06933587269517c18fb558
SHA51220ec789a9f80b5f330120b1d1c6b41b6238c2a0cd7cdd473667172fa287be2b100895b90a9cc65175336f9374f7ae6df2b0e9358d8b199cdaa5a877e112461ab