Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe
-
Size
274KB
-
MD5
53abc84be9c62edfff6cf98118d89b9e
-
SHA1
0f9e6fae58afe1a047e75082a4916aa8250d07c6
-
SHA256
1c5972f66dc92fa15429fda453e48f412c5884a485e1ea306714465dd329e013
-
SHA512
c939473449639499bdd63818dd62a28ce488c1071650adb1df3c4f85859917b3d5d47eec421384e83dbecd79bf98b38566147fec6ceb2765f73e998522da59f5
-
SSDEEP
6144:GYvZ6brUj+bvqHXSpWr2Kqz83Oad3Jg4PlPDIQ+KLzDDg:GYvEbrUjp3SpWggd3JBPlPDIQ3g
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 4672 sidebar2.exe 2184 sidebar2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\open\command 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\DefaultIcon 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\open 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\runas\command 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\runas\command\ = "\"%1\" %*" 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\Content-Type = "application/x-msdownload" 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\ = "Application" 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\DefaultIcon 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\runas 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\ = "prochost" 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\sidebar2.exe\" /START \"%1\" %*" 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\DefaultIcon\ = "%1" 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\prochost\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\sidebar2.exe\" /START \"%1\" %*" 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4672 sidebar2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3404 wrote to memory of 4672 3404 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe 91 PID 3404 wrote to memory of 4672 3404 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe 91 PID 3404 wrote to memory of 4672 3404 2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe 91 PID 4672 wrote to memory of 2184 4672 sidebar2.exe 92 PID 4672 wrote to memory of 2184 4672 sidebar2.exe 92 PID 4672 wrote to memory of 2184 4672 sidebar2.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-21_53abc84be9c62edfff6cf98118d89b9e_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\sidebar2.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\sidebar2.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\sidebar2.exe"3⤵
- Executes dropped EXE
PID:2184
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1036 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:81⤵PID:3816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD5816a144d019ef1fbcc16b03f1a6ba0b5
SHA11908d67e06abe3176653962978963259b46d9c6c
SHA25676ef19c9eca42967d1f9a33c112da6e31f9322bc6fdfc2b74bc5e78ae9d2946b
SHA512410c7e6f54583d7df9f0cb4a46d50295213d4820b567e6780ed6fdac98b19fbe6122b153e7ee24ceb6c529213e6c78626200486b8e21810faba5fd9775835d1b