Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/04/2024, 05:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe
-
Size
328KB
-
MD5
20b5ef37078aa409a6e81c4120b4801f
-
SHA1
6e792ba6803cb774ccac2df4e32276ed9d1b3481
-
SHA256
ac1c2394998cb92927c64bdb3b266e33544f2b5a032e17553236a7c7ac5ccc97
-
SHA512
2dfaadc337b1f4773d543fcedf895c1ba4af3ddb005a13f2a6095fb880ee674e7cc9cb6da40ea3c89fc8a32959d96379186d0a99d153a47c34ca5f97176248e6
-
SSDEEP
6144:e2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG89gkPzDh1v:e2TFafJiHCWBWPMjVWrXf1v
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2516 taskhostsys.exe 2688 taskhostsys.exe -
Loads dropped DLL 4 IoCs
pid Process 2724 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe 2724 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe 2724 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe 2516 taskhostsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jitc\shell\open 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\runas 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jitc\ = "Application" 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jitc\Content-Type = "application/x-msdownload" 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jitc\shell\runas\command\ = "\"%1\" %*" 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jitc\shell\open\command 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jitc\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\taskhostsys.exe\" /START \"%1\" %*" 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\runas\command 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jitc\DefaultIcon 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jitc\DefaultIcon\ = "%1" 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\open\command 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jitc\shell 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\taskhostsys.exe\" /START \"%1\" %*" 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jitc 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jitc\shell\runas\command 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jitc\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jitc\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\DefaultIcon 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\shell\open 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\jitc\shell\runas 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.exe\ = "jitc" 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2516 taskhostsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2516 2724 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe 28 PID 2724 wrote to memory of 2516 2724 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe 28 PID 2724 wrote to memory of 2516 2724 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe 28 PID 2724 wrote to memory of 2516 2724 2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe 28 PID 2516 wrote to memory of 2688 2516 taskhostsys.exe 29 PID 2516 wrote to memory of 2688 2516 taskhostsys.exe 29 PID 2516 wrote to memory of 2688 2516 taskhostsys.exe 29 PID 2516 wrote to memory of 2688 2516 taskhostsys.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"3⤵
- Executes dropped EXE
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD5b517e9e1639f08b4cb4c72972fbd546f
SHA1faedc02e021940f500ab7a4df03208702d8e3f87
SHA256c6986b6da91f165239a5c610c79e7bd659d6ce5cce5442d88ab2c55ebb48a7cb
SHA512a87596ad1087e022cbb4625d7e65b78e1133b3b5fa05ffcf3dbaaa2d441e1292caaa3826ae5605620446048636920fa3f9d821fa59cca340f0f14f68dd276917