Analysis
-
max time kernel
123s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe
-
Size
280KB
-
MD5
85209c69a35d2c2e20cc31eecc755d7d
-
SHA1
1e03b3052e1ac06494314700712cf7ae27e251b5
-
SHA256
cece545e6fa1c49d25e8b770fa526f141a9e3358af3f013b51c4266003579b78
-
SHA512
9a2a732ebeef4ee1b60987b814123fbf78de349b30e3a24e7550299ef1986ecbd690ad0fbe60b4161abfb1215bf2d0cb6e95069358efe78d8fe068ecc5f2b741
-
SSDEEP
6144:KTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:KTBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2704 SearchIndexerDB.exe 2420 SearchIndexerDB.exe -
Loads dropped DLL 3 IoCs
pid Process 1908 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe 1908 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe 1908 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\cmos\shell 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\cmos\ = "Application" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\cmos\DefaultIcon 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\cmos\DefaultIcon\ = "%1" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\cmos\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\cmos\shell\runas 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\cmos\shell\runas\command\ = "\"%1\" %*" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\open\command 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\cmos 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\cmos\Content-Type = "application/x-msdownload" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\cmos\shell\open\command 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\cmos\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\SearchIndexerDB.exe\" /START \"%1\" %*" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\DefaultIcon 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\runas\command 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\SearchIndexerDB.exe\" /START \"%1\" %*" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\cmos\shell\open 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\cmos\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\ = "cmos" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\cmos\shell\runas\command 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\open 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\runas 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2704 SearchIndexerDB.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2704 1908 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe 28 PID 1908 wrote to memory of 2704 1908 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe 28 PID 1908 wrote to memory of 2704 1908 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe 28 PID 1908 wrote to memory of 2704 1908 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe 28 PID 2704 wrote to memory of 2420 2704 SearchIndexerDB.exe 29 PID 2704 wrote to memory of 2420 2704 SearchIndexerDB.exe 29 PID 2704 wrote to memory of 2420 2704 SearchIndexerDB.exe 29 PID 2704 wrote to memory of 2420 2704 SearchIndexerDB.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\SearchIndexerDB.exe"3⤵
- Executes dropped EXE
PID:2420
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD521fed5dde15336630e08c64625aa6ef1
SHA15724bf6ca04e25e610749a85c6b160b9158f8e9b
SHA256fa3832cf230a2171e3a340367633d7b60290c3c5867d818f0d1bf88443a78bee
SHA5121d193a146af60ce8ebb848768ffcf4f045fec5b764a295da9522e9224d6039997c57d7842996f03d0eb9c15ab7c1fde918708ca5fa8321ed036a04408cf22e6d