Analysis
-
max time kernel
141s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 03:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe
-
Size
280KB
-
MD5
d09c8be96c3f1547d6d1bc7de230a957
-
SHA1
ba1db3213466c9a640be53e6896e96d65e1c77f3
-
SHA256
072c71fafd666d3bc9d0360b41063a07b71bcce53001a6358d2e1e9ec8765fa0
-
SHA512
0a8bd991e98e343536592ba72a9d68980766445a914e2afb64caca9207716f0ab51e13bc22496f7cfa82066e2cb25ad654b9e2ed5dad5fa1cee1508d761bf6d6
-
SSDEEP
6144:rTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:rTBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 636 dwmsys.exe 2120 dwmsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\DefaultIcon 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\runas 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\runas\command 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\DefaultIcon 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\dwmsys.exe\" /START \"%1\" %*" 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\open\command 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\dwmsys.exe\" /START \"%1\" %*" 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\runas\command\ = "\"%1\" %*" 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\open 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\ = "Application" 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\Content-Type = "application/x-msdownload" 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\DefaultIcon\ = "%1" 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\ = "ntdriver" 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 636 dwmsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2888 wrote to memory of 636 2888 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe 95 PID 2888 wrote to memory of 636 2888 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe 95 PID 2888 wrote to memory of 636 2888 2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe 95 PID 636 wrote to memory of 2120 636 dwmsys.exe 96 PID 636 wrote to memory of 2120 636 dwmsys.exe 96 PID 636 wrote to memory of 2120 636 dwmsys.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-28_d09c8be96c3f1547d6d1bc7de230a957_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe"3⤵
- Executes dropped EXE
PID:2120
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4128 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:81⤵PID:1596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5b10cfdd4574cc1b026aad50fd714e8fd
SHA1a81d8e24aa6ddcbd5821ac06d2b2ab7ea28285e1
SHA25640e9e234bbbdb3f3c337e58b0420786149c72eacf609ac7c9b67ec7ddec39839
SHA5127a08118d625bd01777769122c50b96cd9939eac54f21d68f250c077d7414f94961548c1bf555637c9fd51b8dacd4baea6b7b87ab95ad918fb6d154a20a7c9869