Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/04/2024, 05:43

General

  • Target

    2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe

  • Size

    328KB

  • MD5

    20b5ef37078aa409a6e81c4120b4801f

  • SHA1

    6e792ba6803cb774ccac2df4e32276ed9d1b3481

  • SHA256

    ac1c2394998cb92927c64bdb3b266e33544f2b5a032e17553236a7c7ac5ccc97

  • SHA512

    2dfaadc337b1f4773d543fcedf895c1ba4af3ddb005a13f2a6095fb880ee674e7cc9cb6da40ea3c89fc8a32959d96379186d0a99d153a47c34ca5f97176248e6

  • SSDEEP

    6144:e2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG89gkPzDh1v:e2TFafJiHCWBWPMjVWrXf1v

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-22_20b5ef37078aa409a6e81c4120b4801f_mafia_nionspy.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"
        3⤵
        • Executes dropped EXE
        PID:2688

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe

          Filesize

          328KB

          MD5

          b517e9e1639f08b4cb4c72972fbd546f

          SHA1

          faedc02e021940f500ab7a4df03208702d8e3f87

          SHA256

          c6986b6da91f165239a5c610c79e7bd659d6ce5cce5442d88ab2c55ebb48a7cb

          SHA512

          a87596ad1087e022cbb4625d7e65b78e1133b3b5fa05ffcf3dbaaa2d441e1292caaa3826ae5605620446048636920fa3f9d821fa59cca340f0f14f68dd276917