Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-04-2024 16:48

General

  • Target

    2024-04-08_f1c9851207f92c1b27ddfbf6e804b8b6_mafia_nionspy.exe

  • Size

    344KB

  • MD5

    f1c9851207f92c1b27ddfbf6e804b8b6

  • SHA1

    f219921f970f2c24585fd47ce6eb61db2e9963cb

  • SHA256

    1c475c3f4259d7f8f3ac0d528909a8acb1960a450593e630765544d0862d62bd

  • SHA512

    35a2348e8aee532b87a65a544ac066456ba5c92e6637b1c2a148789d21caaf9851602694d2d8e1332d55a93ef87f7e21b8ef542577e28f2176a6e689ae9d8c27

  • SSDEEP

    6144:NTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDBRm1+gmN:NTBPFV0RyWl3h2E+7pYm0

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-08_f1c9851207f92c1b27ddfbf6e804b8b6_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-08_f1c9851207f92c1b27ddfbf6e804b8b6_mafia_nionspy.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3888
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\csrssys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\csrssys.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4340
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\csrssys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\csrssys.exe"
        3⤵
        • Executes dropped EXE
        PID:412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\csrssys.exe

    Filesize

    344KB

    MD5

    2edd9824aab01f80c8e03237c5581e45

    SHA1

    43c78cbd578b06613848f851808313c3c15c52d2

    SHA256

    5a8ade91398c96e127315c42643d0a55d4ac54bc11a9ead77e261632f9c13892

    SHA512

    5c859b6e0f7b732ee3421912fb20da9e1fbb8ad2d2aa97975c49d93bc7956b94b913b5ab95511b70c95a69c37e4028edc5d1c32e79b8a97788560df4ea180291