Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe
-
Size
274KB
-
MD5
b70976a44e3d453d9576b5563a87d62a
-
SHA1
1ffcb8acc68e296f4be4b466d1ae24b073d1cd49
-
SHA256
8f094a5790367ef70031ef36df3c254ea8d4f370252c211045a537b435043447
-
SHA512
3fa3708757052179939cddf69d7366285083eb977497856c627025885cfbc2c8ea873ac0d3eef7bce47a756a501821ccbab205e556e32e276daec7a44288589d
-
SSDEEP
6144:rYvZ6brUj+bvqHXSpWr2Kqz83Oad3Jg4PlPDIQ+KLzDDg:rYvEbrUjp3SpWggd3JBPlPDIQ3g
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
csrssys.execsrssys.exepid process 2116 csrssys.exe 2724 csrssys.exe -
Loads dropped DLL 4 IoCs
Processes:
2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.execsrssys.exepid process 2268 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe 2268 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe 2268 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe 2116 csrssys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
Processes:
2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\wexplorer 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\runas 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\wexplorer\ = "Application" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\DefaultIcon 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\csrssys.exe\" /START \"%1\" %*" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\wexplorer\shell 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\wexplorer\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\csrssys.exe\" /START \"%1\" %*" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\wexplorer\shell\runas\command\ = "\"%1\" %*" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\wexplorer\shell\open\command 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\wexplorer\shell\runas 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\open 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\wexplorer\DefaultIcon 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\wexplorer\DefaultIcon\ = "%1" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\open\command 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\wexplorer\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\wexplorer\shell\open 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\runas\command 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\wexplorer\Content-Type = "application/x-msdownload" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\wexplorer\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\wexplorer\shell\runas\command 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\ = "wexplorer" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
csrssys.exedescription pid process Token: SeIncBasePriorityPrivilege 2116 csrssys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.execsrssys.exedescription pid process target process PID 2268 wrote to memory of 2116 2268 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe csrssys.exe PID 2268 wrote to memory of 2116 2268 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe csrssys.exe PID 2268 wrote to memory of 2116 2268 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe csrssys.exe PID 2268 wrote to memory of 2116 2268 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe csrssys.exe PID 2116 wrote to memory of 2724 2116 csrssys.exe csrssys.exe PID 2116 wrote to memory of 2724 2116 csrssys.exe csrssys.exe PID 2116 wrote to memory of 2724 2116 csrssys.exe csrssys.exe PID 2116 wrote to memory of 2724 2116 csrssys.exe csrssys.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"3⤵
- Executes dropped EXE
PID:2724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD53e60a5ea48f8074efa9236609a41e5ec
SHA1352f21c833609fa288652a0be58275afe6fb968e
SHA2560f751df40e9edd813ff381c7ab3c538c6899cb08107d8427090be34a65e69700
SHA512616faf6c5df0cbe013306bf19698f26ebeb248a6a04916df4c3a97c0735de16eacb59d324a97313ab97bf1a082b72864d1a648ebc746d71e681fcd40d33da623