Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe
-
Size
274KB
-
MD5
b70976a44e3d453d9576b5563a87d62a
-
SHA1
1ffcb8acc68e296f4be4b466d1ae24b073d1cd49
-
SHA256
8f094a5790367ef70031ef36df3c254ea8d4f370252c211045a537b435043447
-
SHA512
3fa3708757052179939cddf69d7366285083eb977497856c627025885cfbc2c8ea873ac0d3eef7bce47a756a501821ccbab205e556e32e276daec7a44288589d
-
SSDEEP
6144:rYvZ6brUj+bvqHXSpWr2Kqz83Oad3Jg4PlPDIQ+KLzDDg:rYvEbrUjp3SpWggd3JBPlPDIQ3g
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
Processes:
csrssys.execsrssys.exepid process 2536 csrssys.exe 3548 csrssys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
Processes:
2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\DefaultIcon 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell\open\command 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell\runas 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\wexplorer\DefaultIcon 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\wexplorer\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\wexplorer\Content-Type = "application/x-msdownload" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\csrssys.exe\" /START \"%1\" %*" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\wexplorer\DefaultIcon\ = "%1" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell\open 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\wexplorer\shell\runas\command\ = "\"%1\" %*" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\shell\runas\command 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\wexplorer\shell 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\wexplorer\shell\runas\command 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\wexplorer\shell\runas 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\.exe\ = "wexplorer" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\wexplorer\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\wexplorer\shell\open\command 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\wexplorer\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\csrssys.exe\" /START \"%1\" %*" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\wexplorer\shell\open 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\wexplorer 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\wexplorer\ = "Application" 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
csrssys.exedescription pid process Token: SeIncBasePriorityPrivilege 2536 csrssys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.execsrssys.exedescription pid process target process PID 1696 wrote to memory of 2536 1696 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe csrssys.exe PID 1696 wrote to memory of 2536 1696 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe csrssys.exe PID 1696 wrote to memory of 2536 1696 2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe csrssys.exe PID 2536 wrote to memory of 3548 2536 csrssys.exe csrssys.exe PID 2536 wrote to memory of 3548 2536 csrssys.exe csrssys.exe PID 2536 wrote to memory of 3548 2536 csrssys.exe csrssys.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_b70976a44e3d453d9576b5563a87d62a_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"3⤵
- Executes dropped EXE
PID:3548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD53e60a5ea48f8074efa9236609a41e5ec
SHA1352f21c833609fa288652a0be58275afe6fb968e
SHA2560f751df40e9edd813ff381c7ab3c538c6899cb08107d8427090be34a65e69700
SHA512616faf6c5df0cbe013306bf19698f26ebeb248a6a04916df4c3a97c0735de16eacb59d324a97313ab97bf1a082b72864d1a648ebc746d71e681fcd40d33da623