Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe
-
Size
344KB
-
MD5
533908b48069551ece9fc9e7d327c82d
-
SHA1
05b520413c8183e6b2d5660a8a17c561b51c1790
-
SHA256
9af5ad273818c2150a4b6aea7e13a288dad527a201c699ad8ddd053434bcf4cd
-
SHA512
c22a02bc3dc5e6ed76e3d084b3597854f335555c0bb9e09a0aca51d997a2958976e6277e348bcd21a1690eb0634b20f7c10d12b2c12e4c8a27d55b08c12168a4
-
SSDEEP
6144:sTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDBRm1+gmN:sTBPFV0RyWl3h2E+7pYm0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 4948 lsassys.exe 5940 lsassys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.exe\shell\runas\command 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.exe\DefaultIcon 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\halnt\DefaultIcon 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\halnt\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\lsassys.exe\" /START \"%1\" %*" 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\halnt\shell\runas\command 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.exe\shell 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\halnt\ = "Application" 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\halnt\shell\open\command 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\halnt\shell\runas 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.exe\shell\open\command 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\halnt\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.exe 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.exe\shell\open 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\Local Settings 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\halnt\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\halnt\shell\runas\command\ = "\"%1\" %*" 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\lsassys.exe\" /START \"%1\" %*" 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\halnt\DefaultIcon\ = "%1" 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.exe\shell\runas 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\halnt 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\halnt\Content-Type = "application/x-msdownload" 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\halnt\shell 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\halnt\shell\open 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.exe\ = "halnt" 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4948 lsassys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5800 wrote to memory of 4948 5800 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe 83 PID 5800 wrote to memory of 4948 5800 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe 83 PID 5800 wrote to memory of 4948 5800 2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe 83 PID 4948 wrote to memory of 5940 4948 lsassys.exe 84 PID 4948 wrote to memory of 5940 4948 lsassys.exe 84 PID 4948 wrote to memory of 5940 4948 lsassys.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-02_533908b48069551ece9fc9e7d327c82d_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5800 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\lsassys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SView\lsassys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\lsassys.exe"3⤵
- Executes dropped EXE
PID:5940
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD515bcb47f429bb613c053ee49bdf66eb6
SHA109f748af44298c9f2438d0379e38279c79e482c6
SHA256ca52ded6d633c19808108b03ebca68ff30287ed63162e3b5457e88ccb3bc930c
SHA512f02461a8ea106433662a4e10b9bb6bd12bf8aa7e5de5419965bf2c7b7f2689fc996d79332c57b07b1992218a28dcf6df48a8ca35c4d407768859622d5193135d