Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe
-
Size
280KB
-
MD5
0266675d07460d114a416f20ab60155d
-
SHA1
9bd001c7835a61c3671f3fda6456c35d31e7f6e9
-
SHA256
a04da272cfc3d7d0391c0b32254094f6a62eebad003dde235f083be058000073
-
SHA512
71dbeffd83fceaf29050db2dace4a581b1e2780b78cb5cb0c23756c0cec3176b47df873211da7227ed55c3f247d4ee49d5e115e3354615cea4205fde668360dd
-
SSDEEP
6144:CQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:CQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2900 winit32.exe 2576 winit32.exe -
Loads dropped DLL 4 IoCs
pid Process 1540 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe 1540 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe 1540 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe 2900 winit32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\ntdriver 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\ntdriver\ = "Application" 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\ntdriver\shell\runas\command\ = "\"%1\" %*" 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\open 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\winit32.exe\" /START \"%1\" %*" 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\ntdriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\winit32.exe\" /START \"%1\" %*" 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\ = "ntdriver" 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\ntdriver\Content-Type = "application/x-msdownload" 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\ntdriver\shell\runas\command 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\ntdriver\shell 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\ntdriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\open\command 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\runas\command 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\shell\runas 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\ntdriver\DefaultIcon\ = "%1" 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\ntdriver\shell\open\command 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\ntdriver\shell\open 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\ntdriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\ntdriver\DefaultIcon 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\ntdriver\shell\runas 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.exe\DefaultIcon 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2900 winit32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2900 1540 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe 28 PID 1540 wrote to memory of 2900 1540 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe 28 PID 1540 wrote to memory of 2900 1540 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe 28 PID 1540 wrote to memory of 2900 1540 2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe 28 PID 2900 wrote to memory of 2576 2900 winit32.exe 29 PID 2900 wrote to memory of 2576 2900 winit32.exe 29 PID 2900 wrote to memory of 2576 2900 winit32.exe 29 PID 2900 wrote to memory of 2576 2900 winit32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-21_0266675d07460d114a416f20ab60155d_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"3⤵
- Executes dropped EXE
PID:2576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5e6164bf1bef60175254ffac215330f36
SHA13f52e36a26403e8132cc82f27ba46645253cfb9c
SHA2564c83e0614c51688a3762910c6eaebde12cf681e034b3b48ed10aaae7588e8b28
SHA512af70c47499e17c319129e17de4324128bbb888e6cb745365e4007c59552cdabc26e073af40a3815b56d8d19c1aa923aa0b8dfa5bd4f2be73cb82bc0b350aa927