Analysis
-
max time kernel
123s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe
-
Size
280KB
-
MD5
9934158467ad5f5a55c06ac5c4495c15
-
SHA1
d393c5ef818482bb367e7c4b50d12bd7918280c1
-
SHA256
1ec0ff81efeb3d6162975cfeb85c6dbce945e4195157cd4e259f018e5a0d284e
-
SHA512
157fd1f94d4d9083b583a51d09ea727cf2559d3df84149a6ff0c68d918b7ab15ca057ab13bee23b8c350b752f4f80aa7dc81db9e721d26b30e616c10f05d4241
-
SSDEEP
6144:oTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:oTBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2672 lsassys.exe 2560 lsassys.exe -
Loads dropped DLL 3 IoCs
pid Process 3060 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe 3060 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe 3060 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\halnt\DefaultIcon 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\halnt\shell 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\open 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\halnt\DefaultIcon\ = "%1" 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\halnt\shell\open\command 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\ = "halnt" 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\DefaultIcon 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\halnt\ = "Application" 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\halnt\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\lsassys.exe\" /START \"%1\" %*" 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\halnt\shell\runas 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\runas\command 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\runas 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\halnt\Content-Type = "application/x-msdownload" 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\halnt\shell\open 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\halnt\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\halnt\shell\runas\command 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\halnt\shell\runas\command\ = "\"%1\" %*" 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\halnt\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\halnt 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\open\command 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\lsassys.exe\" /START \"%1\" %*" 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2672 lsassys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2672 3060 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe 28 PID 3060 wrote to memory of 2672 3060 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe 28 PID 3060 wrote to memory of 2672 3060 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe 28 PID 3060 wrote to memory of 2672 3060 2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe 28 PID 2672 wrote to memory of 2560 2672 lsassys.exe 29 PID 2672 wrote to memory of 2560 2672 lsassys.exe 29 PID 2672 wrote to memory of 2560 2672 lsassys.exe 29 PID 2672 wrote to memory of 2560 2672 lsassys.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_9934158467ad5f5a55c06ac5c4495c15_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\lsassys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\lsassys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\lsassys.exe"3⤵
- Executes dropped EXE
PID:2560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD58ddd274491d971a7a1e4bd702e97b234
SHA1abcf8a02dfe75f1f7ac091b35b19dbf22f5aa78b
SHA256356ffdaec2bdaef382b282e68d398442357d10871ef757d49468f839d3b28de4
SHA512fe3759203652e891ce5e12ea032f9763427eceb1949674aaec653bb4cce7be89b5548517957d27eca51ace64155baa64026427d41a9120f267269f4d440801ed