Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/04/2024, 12:46

General

  • Target

    2024-04-08_58554ae82793e2fb9a351bc8de8316af_mafia_nionspy.exe

  • Size

    280KB

  • MD5

    58554ae82793e2fb9a351bc8de8316af

  • SHA1

    270de32d4b69d205dd39ee2edc300008375b02de

  • SHA256

    062f1d5e093138c8f4e3598c5c0e28f0558976ff89ea3579aaf3c2d983ebe5ef

  • SHA512

    6a53772765585bbe72b1acb5742d393cfd67d814f163157873ff45738041cf589507a22581d60bf5d50e78cb540786397d9dad5f167174b270ef217bff819280

  • SSDEEP

    6144:hDTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:ZTBPFV0RyWl3h2E+7pl

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-08_58554ae82793e2fb9a351bc8de8316af_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-08_58554ae82793e2fb9a351bc8de8316af_mafia_nionspy.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe"
        3⤵
        • Executes dropped EXE
        PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\SView\csrssys.exe

    Filesize

    280KB

    MD5

    5ac2567ae0930921b12effb6534e2625

    SHA1

    07c4398b98aea3c7245562fe7bfe36188515275f

    SHA256

    ecb265a94b71da9a3779566dbe7eb987016ec947645d7e9b219e5847b298d4a4

    SHA512

    f9496d751a7d14f0eeb4ed23103f27ec03605260595541732448be5a9ec143861361d58ec5cf6739899dc65a1d79a3b881af1a227da052e4b7face3cf6bae849