Malware Analysis Report

2025-01-18 02:00

Sample ID 240613-jjvr1szclh
Target 2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy
SHA256 9a5f31aa108d5210a5e2a85bd6e59385a33f55158974becc46b6047a8cf2a98b
Tags
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

9a5f31aa108d5210a5e2a85bd6e59385a33f55158974becc46b6047a8cf2a98b

Threat Level: Shows suspicious behavior

The file 2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy was found to be: Shows suspicious behavior.

Malicious Activity Summary


Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Unsigned PE

Enumerates physical storage devices

Modifies registry class

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 07:42

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 07:42

Reported

2024-06-13 07:44

Platform

win7-20240221-en

Max time kernel

121s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe"

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\wexplorer C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\wexplorer\ = "Application" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\wexplorer\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\csrssys.exe\" /START \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\wexplorer\shell C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\wexplorer\shell\runas C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\wexplorer\shell\runas\command\IsolatedCommand = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.exe\shell\open C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.exe\shell\runas\command C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\wexplorer\shell\open\command\IsolatedCommand = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.exe\ = "wexplorer" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.exe\DefaultIcon C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\wexplorer\Content-Type = "application/x-msdownload" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\wexplorer\DefaultIcon C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\wexplorer\shell\open\command C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\wexplorer\shell\runas\command C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.exe C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.exe\shell\open\command C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.exe\shell C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\csrssys.exe\" /START \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\wexplorer\DefaultIcon\ = "%1" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\wexplorer\shell\open C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\wexplorer\shell\runas\command\ = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.exe\DefaultIcon\ = "%1" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.exe\shell\runas C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2904 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe
PID 2904 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe
PID 2904 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe
PID 2904 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe
PID 2572 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe
PID 2572 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe
PID 2572 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe
PID 2572 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 nwoccs.zapto.org udp

Files

memory/2904-0-0x00000000002E0000-0x000000000033C000-memory.dmp

\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\csrssys.exe

MD5 9f5e3fd2784670e9792336713c89f9f2
SHA1 fe4ae82d3b40e552b5d997abba8af3c5689907e7
SHA256 62b335c06eabd01b8b1b9bb9676c8ff6a3fd50b2af895a69712ffdb3c4936733
SHA512 03e4525cd365e7e82ec4df197ef7e746c60e069a60cb25d8ee7e3f3bd58507f82a87f369fb107e868ac5e4105dc7d538181e0677ceb3544eb268473379569b0d

memory/2904-25-0x0000000002C60000-0x0000000002C70000-memory.dmp

memory/2904-28-0x0000000002D80000-0x0000000002DDC000-memory.dmp

memory/2632-37-0x00000000012F0000-0x000000000134C000-memory.dmp

memory/2904-38-0x00000000002E0000-0x000000000033C000-memory.dmp

memory/2572-39-0x00000000012F0000-0x000000000134C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 07:42

Reported

2024-06-13 07:44

Platform

win10v2004-20240508-en

Max time kernel

129s

Max time network

138s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.exe\shell\open\command C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.exe\shell\runas C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\ntdriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\ntdriver\shell\runas\command C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\ntdriver\shell\runas C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\ntdriver\shell\open C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\ntdriver\ = "Application" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\ntdriver\Content-Type = "application/x-msdownload" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.exe\shell C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.exe\shell\runas\command C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\ntdriver\shell C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.exe\DefaultIcon\ = "%1" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.exe\Content-Type = "application/x-msdownload" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\ntdriver C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\ntdriver\shell\open\command C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\ntdriver\DefaultIcon C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\ntdriver\shell\open\command\IsolatedCommand = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.exe\ = "ntdriver" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\winit32.exe\" /START \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\ntdriver\DefaultIcon\ = "%1" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\ntdriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\winit32.exe\" /START \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.exe\DefaultIcon C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.exe\shell\open C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\ntdriver\shell\runas\command\ = "\"%1\" %*" C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.exe C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\winit32.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-13_b35dd0c4adf185e169412c6ecb6881e7_mafia_nionspy.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\winit32.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\winit32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\winit32.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\winit32.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\winit32.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4232,i,13879737908471496610,15335851594401413307,262144 --variations-seed-version --mojo-platform-channel-handle=4316 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 nwoccs.zapto.org udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 nwoccs.zapto.org udp
US 8.8.8.8:53 nwoccs.zapto.org udp

Files

memory/1072-0-0x0000000000EF0000-0x0000000000F4C000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\winit32.exe

MD5 d367c55693af2c31b4535c76003b9b85
SHA1 39fec035ea4208f430ec51b7b2cb4edf1c4c26d3
SHA256 2512fdb9d52fe5a1efc5386736abf7f1d2cf58d7f7c1127edea9bb240a0fd145
SHA512 b28f093716a31ed827ca2cbd98503800e13e5d0d708977439e23b670bdf95eceee3cbe35eca1d8fc173c42e2ab32a0cede728e0a56a4e9123523231fa23054f0

memory/2528-57-0x0000000000380000-0x00000000003DC000-memory.dmp

memory/1072-56-0x0000000000EF0000-0x0000000000F4C000-memory.dmp

memory/4444-59-0x0000000000380000-0x00000000003DC000-memory.dmp

memory/4444-60-0x0000000000380000-0x00000000003DC000-memory.dmp

memory/2528-61-0x0000000000380000-0x00000000003DC000-memory.dmp