Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 22:21
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe
-
Size
274KB
-
MD5
1a3ccf517dfac688af230c1dc792f81c
-
SHA1
f31e71e8a027722cb34d61890ec7981214b29536
-
SHA256
2e11b1e7884565adab0f3a1cbcfcf30f4ad32f1c3a612873c9a86c987c93a7a3
-
SHA512
8a9bc1cf17f756e10c015ac45f6fa7997ef49a957e6100ab3c5fbd134dbac9f67727737a4047f6600689d1c25af94a752c7f51cd8ba120a9fadd6196f8895653
-
SSDEEP
6144:EYvZ6brUj+bvqHXSpWr2Kqz83Oad3Jg4PlPDIQ+KLzDDg:EYvEbrUjp3SpWggd3JBPlPDIQ3g
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 2080 dwmsys.exe 4800 dwmsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\systemui\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\systemui\shell\runas\command 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\.exe 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\systemui\Content-Type = "application/x-msdownload" 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\.exe\ = "systemui" 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\dwmsys.exe\" /START \"%1\" %*" 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\systemui\shell 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\.exe\shell\runas 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\systemui\shell\runas 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\.exe\shell\open 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\systemui\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\dwmsys.exe\" /START \"%1\" %*" 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\systemui\shell\runas\command\ = "\"%1\" %*" 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\.exe\shell\runas\command 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\systemui\shell\open\command 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\.exe\shell 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\.exe\DefaultIcon 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\systemui\ = "Application" 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\systemui\DefaultIcon 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\systemui\DefaultIcon\ = "%1" 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\systemui\shell\open 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\.exe\shell\open\command 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\systemui 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\systemui\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2080 dwmsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 548 wrote to memory of 2080 548 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe 91 PID 548 wrote to memory of 2080 548 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe 91 PID 548 wrote to memory of 2080 548 2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe 91 PID 2080 wrote to memory of 4800 2080 dwmsys.exe 92 PID 2080 wrote to memory of 4800 2080 dwmsys.exe 92 PID 2080 wrote to memory of 4800 2080 dwmsys.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-15_1a3ccf517dfac688af230c1dc792f81c_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\dwmsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\dwmsys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\dwmsys.exe"3⤵
- Executes dropped EXE
PID:4800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD57c12053d834f539fc98597d8999d476f
SHA13319c344322e2ad2a7186c4d90d2cb4b783009a9
SHA256a746cd8da164c2813ba17fc1899ae16add974287a104154b3d9c6bea11d6b0e6
SHA512e8022e95dfef7b5ad0409844d0f1f77402d7d3d2bc56a4599fdc7024bc85777c00c7eac7c1a74ca8e21862421578c77b903c015339e4a0dc987ac3226d07e13f