Analysis
-
max time kernel
160s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 04:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe
-
Size
280KB
-
MD5
85209c69a35d2c2e20cc31eecc755d7d
-
SHA1
1e03b3052e1ac06494314700712cf7ae27e251b5
-
SHA256
cece545e6fa1c49d25e8b770fa526f141a9e3358af3f013b51c4266003579b78
-
SHA512
9a2a732ebeef4ee1b60987b814123fbf78de349b30e3a24e7550299ef1986ecbd690ad0fbe60b4161abfb1215bf2d0cb6e95069358efe78d8fe068ecc5f2b741
-
SSDEEP
6144:KTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:KTBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 1528 sidebar2.exe 2128 sidebar2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\open\command 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\runas 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\ = "Application" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\DefaultIcon 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\runas\command 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\DefaultIcon 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\runas\command\ = "\"%1\" %*" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\ = "prochost" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\sidebar2.exe\" /START \"%1\" %*" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\open 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\Content-Type = "application/x-msdownload" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\sidebar2.exe\" /START \"%1\" %*" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\DefaultIcon\ = "%1" 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1528 sidebar2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3552 wrote to memory of 1528 3552 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe 97 PID 3552 wrote to memory of 1528 3552 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe 97 PID 3552 wrote to memory of 1528 3552 2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe 97 PID 1528 wrote to memory of 2128 1528 sidebar2.exe 98 PID 1528 wrote to memory of 2128 1528 sidebar2.exe 98 PID 1528 wrote to memory of 2128 1528 sidebar2.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-19_85209c69a35d2c2e20cc31eecc755d7d_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\sidebar2.exe"3⤵
- Executes dropped EXE
PID:2128
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4156 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD553eded6973b0287a7dca1ee1656bee48
SHA155061ec2075f87c1fc9c6cd30f5ff67b12b17f26
SHA25610129a7e7b8c22cebb7cc3802ce8b7e2560962a1a16e77866526f90c56314d4b
SHA512497d45b6225307d1480de5e1d50a14b46ed590e2cf405bc57c7eb6c8fe199eea4526c7738bc2837efdebecc8b3a1a807343a21831bc22ac640d2ad76773c7506