Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 23:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe
-
Size
348KB
-
MD5
30e9ff8c4a42fc4b32576f22b3431a79
-
SHA1
1dcb87040aec5d42f73d5477e95d80dab354bb83
-
SHA256
877e2493020ddb9a351bc2ffbf30dd46d6fe1159a3de898bffa66cbfd96d6b48
-
SHA512
21dd058a4e3703905650fa50e5168246f50847af71a97f6b1fa60209dc34cbcc740f9183bd508b66844b89c350ca415c9f7356becaadae6276c0dc3d9ad13836
-
SSDEEP
6144:T2+JS2sFZfI8U0obHCW/2a7XQcsPMjVWr289gkPzDhmv:T2TFZfJiHCWBWPMjVWrHfmv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 3156 wlogon32.exe 2936 wlogon32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\haldriver\ = "Application" 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\haldriver\shell\open 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\haldriver\shell\runas\command\ = "\"%1\" %*" 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\haldriver\shell\runas 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\ = "haldriver" 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\haldriver\shell 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\haldriver\DefaultIcon\ = "%1" 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\haldriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\wlogon32.exe\" /START \"%1\" %*" 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\haldriver\DefaultIcon 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\haldriver\shell\runas\command 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\haldriver 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\haldriver\Content-Type = "application/x-msdownload" 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\haldriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\haldriver\shell\open\command 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\DefaultIcon 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\haldriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\wlogon32.exe\" /START \"%1\" %*" 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3156 wlogon32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4848 wrote to memory of 3156 4848 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe 90 PID 4848 wrote to memory of 3156 4848 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe 90 PID 4848 wrote to memory of 3156 4848 2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe 90 PID 3156 wrote to memory of 2936 3156 wlogon32.exe 91 PID 3156 wrote to memory of 2936 3156 wlogon32.exe 91 PID 3156 wrote to memory of 2936 3156 wlogon32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-10_30e9ff8c4a42fc4b32576f22b3431a79_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe"3⤵
- Executes dropped EXE
PID:2936
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3804 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:4952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD577e25f32d69d29f8740725ccc65eb7ab
SHA14f3af2287ce24fca052801c85dd4be8b09179463
SHA2565b2a41112ce15c4b1c226d1f74e1871cc1da742e01d7d8a8597ab8ddc054be8f
SHA512e92a0adfdeb22878694a4313d838f3e9d2ecacdf2601e8c57517703af3bc09c9b4752a26e7eed478620e4a226adb9d82e5020057a3f819c7b9cfb4658bb89774