Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2024, 16:42

General

  • Target

    2024-04-16_f711ed448f44d368372baed2b9aca8d4_mafia_nionspy.exe

  • Size

    344KB

  • MD5

    f711ed448f44d368372baed2b9aca8d4

  • SHA1

    d897e89865f84d6a9a23c6a4962d46b0bc94ae33

  • SHA256

    102df36cd751d879c8581df9450f71336213953929dd5325d67a31b9fba43bda

  • SHA512

    4b40c6d04d222a73262c7ef121e43a72db303a0cb0375bf16dfb5d30d13335e3412697aab1b4c1b36aeab952844871dc13ec388c5b722f12019d4457da2f8ab6

  • SSDEEP

    6144:pTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDBRm1+gmN:pTBPFV0RyWl3h2E+7pYm0

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-16_f711ed448f44d368372baed2b9aca8d4_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-16_f711ed448f44d368372baed2b9aca8d4_mafia_nionspy.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3332
    • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\SearchIndexerDB.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\SearchIndexerDB.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\SearchIndexerDB.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\SearchIndexerDB.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\SearchIndexerDB.exe"
        3⤵
        • Executes dropped EXE
        PID:2156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\SearchIndexerDB.exe

    Filesize

    344KB

    MD5

    261c1ea97a5579f6b4c0b3dcd519069f

    SHA1

    3a375d62b7c5f1816729ce971a0d4fa409f21e4f

    SHA256

    878dc0dbd9c5ec30b9a8e9e1aa3e0b9352d483bd621f529b014de74c90ebf01e

    SHA512

    9f2888d48c9a5c4b6d365957e302ee80e433d50ba7466f8dcc1e75611bd4eea03cdd85f21f40c7bc6685b0bff099fa219b8d2d1dc7d479f164ce8fbd7bcba697