Analysis
-
max time kernel
135s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 01:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe
-
Size
280KB
-
MD5
ea2f7772ba3af03e5727ed60c5c54c60
-
SHA1
dadc3c27ac53c4fa227c2153b5305a4e064cf3f8
-
SHA256
990790947d48ba9d0ef91eeea8f9a46c3b7edc4f22c134e2dc5e47ad1c635baa
-
SHA512
3ab469c50bd4f40607087b2da8663575e49f85a52d45706d90afd5d8d1be51ffec52a9c2a75b2aedffa189014bd4588dd3e78d692faec7d8b81bdba786bfc258
-
SSDEEP
6144:FQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:FQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 4984 winit32.exe 5004 winit32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ntdriver\shell\runas\command\ = "\"%1\" %*" 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ntdriver 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ntdriver\DefaultIcon 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ntdriver\shell 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ntdriver\shell\runas 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\.exe\ = "ntdriver" 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\.exe\DefaultIcon 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\winit32.exe\" /START \"%1\" %*" 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ntdriver\shell\runas\command 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\.exe\shell\runas\command 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ntdriver\DefaultIcon\ = "%1" 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ntdriver\shell\open\command 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\.exe 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\.exe\shell 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\.exe\shell\runas 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ntdriver\ = "Application" 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ntdriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ntdriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\.exe\shell\open 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ntdriver\Content-Type = "application/x-msdownload" 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ntdriver\shell\open 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ntdriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\winit32.exe\" /START \"%1\" %*" 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\.exe\shell\open\command 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4984 winit32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1652 wrote to memory of 4984 1652 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe 83 PID 1652 wrote to memory of 4984 1652 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe 83 PID 1652 wrote to memory of 4984 1652 2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe 83 PID 4984 wrote to memory of 5004 4984 winit32.exe 84 PID 4984 wrote to memory of 5004 4984 winit32.exe 84 PID 4984 wrote to memory of 5004 4984 winit32.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-03_ea2f7772ba3af03e5727ed60c5c54c60_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\winit32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\winit32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\winit32.exe"3⤵
- Executes dropped EXE
PID:5004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD517129360774fb04bc19ace826bef1aa5
SHA109d2515ab9dacd038726d40181920e253b6d16e4
SHA256790b16c753e57b8a1a2c2436c295f25cdd47503732d497b0fbd86cf603893c85
SHA51291c8b7a137e1fa0c9a97eab0bdd0a5910bf3e5e7641b4038523a0bf79aa32730edff22e753bee0ffd54ece4ca8572e6b5dc7b6bec29dd6e71b465204e23bda58