Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 00:59
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe
-
Size
279KB
-
MD5
e53c48079be951fc9a005c4c28783f03
-
SHA1
6c66abeca163a73a4f07d28ce9051d02710dfda0
-
SHA256
53a3acd05d9d4a2641cf064b880aac63c14447df60612c1c47809713421677a5
-
SHA512
679ff782e8d6f7f151a3b621c29446a91e0536a513ace34e9a78e77ed2fb3eecaece25c22b875f57c45e805ccb93e8c81aa4cd1eae0450a3cd68c6674822e55d
-
SSDEEP
6144:1Tz+WrPFZvTXb4RyW42vFlOloh2E+7phg7ozD:1TBPFV0RyWl3h2E+7ph
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 1044 winit32.exe 4288 winit32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\Content-Type = "application/x-msdownload" 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\winit32.exe\" /START \"%1\" %*" 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\ = "Application" 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\open 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\ = "ntdriver" 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\winit32.exe\" /START \"%1\" %*" 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\DefaultIcon\ = "%1" 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\open\command 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\runas\command 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\runas\command\ = "\"%1\" %*" 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\shell\runas 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\DefaultIcon 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\ntdriver\DefaultIcon 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1044 winit32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4664 wrote to memory of 1044 4664 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe 91 PID 4664 wrote to memory of 1044 4664 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe 91 PID 4664 wrote to memory of 1044 4664 2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe 91 PID 1044 wrote to memory of 4288 1044 winit32.exe 92 PID 1044 wrote to memory of 4288 1044 winit32.exe 92 PID 1044 wrote to memory of 4288 1044 winit32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-07_e53c48079be951fc9a005c4c28783f03_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\winit32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\winit32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\winit32.exe"3⤵
- Executes dropped EXE
PID:4288
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
279KB
MD5c956faa67d22f4e2a53d6958155dc5a4
SHA1be5ab5837bb1e37718d5066e34b58dfb16c82613
SHA256a345c93bb269e67dec2211633d91a14e11fdf32e5bfa9de8ab40e981b742888e
SHA5123df4fb18df11bf4fa50e7e0d36b9726100b4d1016747e73f2984fb010d69304eff8425197c01eb283829c6a1ada4ee5274ded01c430c0434b7084a3c79ff71e5