Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 03:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe
-
Size
280KB
-
MD5
fccf66274874898196ba9cb6847f37d6
-
SHA1
dfd56a47476ed62f4728a3fa84a855e7538e0f83
-
SHA256
daa74db3bc5a2788d34aa5a3e8c13c0a77d133f17d0c8f52926fe18ec9e96f3d
-
SHA512
0628f76ccc304efb0bfeb3793108ca4fd2a950d87c40a2c73028e5b5507262aa8e01b702db46ac9e4e649bf47fb0100d61531fe2f14a2a7fd35754b1f09965c4
-
SSDEEP
6144:yQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:yQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 1680 taskhostsys.exe 548 taskhostsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\jitc\Content-Type = "application/x-msdownload" 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\jitc\DefaultIcon\ = "%1" 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\jitc\shell\runas\command 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\jitc\DefaultIcon 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\jitc\shell\open\command 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\.exe 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\.exe\shell\runas\command 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\jitc\shell 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\jitc\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\.exe\ = "jitc" 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\Local Settings 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\jitc 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\.exe\shell\open\command 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\.exe\shell 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\jitc\shell\runas 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\.exe\shell\open 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\jitc\shell\runas\command\ = "\"%1\" %*" 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\.exe\DefaultIcon 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\jitc\ = "Application" 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\jitc\shell\open 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\jitc\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\taskhostsys.exe\" /START \"%1\" %*" 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\.exe\shell\runas 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\jitc\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\taskhostsys.exe\" /START \"%1\" %*" 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1680 taskhostsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5028 wrote to memory of 1680 5028 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe 91 PID 5028 wrote to memory of 1680 5028 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe 91 PID 5028 wrote to memory of 1680 5028 2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe 91 PID 1680 wrote to memory of 548 1680 taskhostsys.exe 92 PID 1680 wrote to memory of 548 1680 taskhostsys.exe 92 PID 1680 wrote to memory of 548 1680 taskhostsys.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-19_fccf66274874898196ba9cb6847f37d6_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\taskhostsys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\taskhostsys.exe"3⤵
- Executes dropped EXE
PID:548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5ebe1f81878a5d9845736ad439f2aeb97
SHA15ca29570c4bc0f0307d29cea82a16f17fc72c857
SHA256748642678d6d96b09b37f9d1f4b9cbfdd321aa0886588a42e31820d1684a9f89
SHA51268a9f578a7abc579084b99403102cc2aff190b9ef1beebe4d15788726ca4e0338f5aacc44d16341a225cec88658924c20d902f20737d90a74bd7919dc628a278