Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/03/2024, 00:55

General

  • Target

    2024-03-20_8f57a03f6e8befa9f5708f2c46b97828_mafia_nionspy.exe

  • Size

    274KB

  • MD5

    8f57a03f6e8befa9f5708f2c46b97828

  • SHA1

    3435eda319a86023d1ded265eb9990ff6b11f261

  • SHA256

    f9c75fdcfde25db554f18f0b00d9a39306da8cfb3d28c4fb0378d2a5c0319c0c

  • SHA512

    6f41c0797d1b619ec6a1dbf4e5e4adfc1777b063a9b8910f8459d9f90d06c6ccecfe94cc08732b1c70c8a63b9658af58a3a9d4458c40c880b499c34a5e9c98dd

  • SSDEEP

    6144:ZYvZ6brUj+bvqHXSpWr2Kqz83Oad3Jg4PlPDIQ+KLzDDg:ZYvEbrUjp3SpWggd3JBPlPDIQ3g

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-20_8f57a03f6e8befa9f5708f2c46b97828_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-20_8f57a03f6e8befa9f5708f2c46b97828_mafia_nionspy.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4324
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\taskhostsys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\taskhostsys.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\taskhostsys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\taskhostsys.exe"
        3⤵
        • Executes dropped EXE
        PID:2060

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\taskhostsys.exe

          Filesize

          274KB

          MD5

          ed6366b9eff8f634f440eb75b5772590

          SHA1

          f6eeb736eb98112f1eeef588ac61262876c62fea

          SHA256

          91175a6c91f1ff2edfa27330918303295491b5c9ebd512431d542f52bc4215a3

          SHA512

          2ae3d4261c7b4730b40a4f7dab148be872b3812ee859632bfeee75b98b09b53b158a78ee03c0bb5a66ab4db3558a7a18cd8157713be375ef02f68bc4fc02e023