Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe
-
Size
280KB
-
MD5
9edbf94fd5a2ea7a57b710ce89439d2e
-
SHA1
c4980be7dd5837511a9714bb61f298ac08ff5739
-
SHA256
2a34b9cfa315215a22767a8c42d3a9d6e4254b244058bb66957d62855f19b884
-
SHA512
2edf6cbed22142a21146299339cbf4d55f2bc3ee5f4ea9c1e4f5c11487529eff763514ce8206f913272ef3f6c3bcc4471b885155a507cb76ca1476af94228156
-
SSDEEP
6144:xQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:xQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2700 csrssys.exe 2412 csrssys.exe -
Loads dropped DLL 4 IoCs
pid Process 2012 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe 2012 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe 2012 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe 2700 csrssys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\wexplorer 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\wexplorer\shell\runas 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\wexplorer\Content-Type = "application/x-msdownload" 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\wexplorer\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\csrssys.exe\" /START \"%1\" %*" 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\wexplorer\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\wexplorer\shell\runas\command\ = "\"%1\" %*" 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\DefaultIcon 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\wexplorer\shell\open\command 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\open\command 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\wexplorer\DefaultIcon\ = "%1" 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\wexplorer\shell\open 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\csrssys.exe\" /START \"%1\" %*" 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\runas\command 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\runas 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\wexplorer\shell\runas\command 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\open 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\wexplorer\shell 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\wexplorer\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\wexplorer\ = "Application" 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\wexplorer\DefaultIcon 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\ = "wexplorer" 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2700 csrssys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2700 2012 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe 28 PID 2012 wrote to memory of 2700 2012 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe 28 PID 2012 wrote to memory of 2700 2012 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe 28 PID 2012 wrote to memory of 2700 2012 2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe 28 PID 2700 wrote to memory of 2412 2700 csrssys.exe 29 PID 2700 wrote to memory of 2412 2700 csrssys.exe 29 PID 2700 wrote to memory of 2412 2700 csrssys.exe 29 PID 2700 wrote to memory of 2412 2700 csrssys.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-27_9edbf94fd5a2ea7a57b710ce89439d2e_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe"3⤵
- Executes dropped EXE
PID:2412
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD599e1d077c8c456e511927b9f3b897ff1
SHA1355bafb4e1aeadde1d7c6012c79549c8be7d1d3d
SHA2566b0684a4578809bd144e9cd5ac2366154c79b6ce96e067bf7f3af81c49ddbf0a
SHA51292dadca9b024423af96578744abdf3a91b5aad58ee3e4dc0890a522e1b1bd29bbccc048051a86f9c73df297998aea31f8356079c1abdbbb03591c895cbcd13c8