Analysis

  • max time kernel
    123s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 12:06

General

  • Target

    2024-07-09_f3a4c0c0dfc0a822c887699dcac1c7f7_mafia_nionspy.exe

  • Size

    288KB

  • MD5

    f3a4c0c0dfc0a822c887699dcac1c7f7

  • SHA1

    f0aa15780fcdfe20a926eeaab2fb571459755617

  • SHA256

    e449dd265ff0cd4e73fc7f382db5afea7651e961f49f754c9270fe509199488e

  • SHA512

    735bd186ebe8b87e1da47043e874d7f9ce857d5a61295d40ea7613e4e14e7fb045de9e37123cca437490a497e1b7b6bee476a954b2f223e3e236e3a4144f21e5

  • SSDEEP

    6144:YQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:YQMyfmNFHfnWfhLZVHmOog

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-09_f3a4c0c0dfc0a822c887699dcac1c7f7_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-09_f3a4c0c0dfc0a822c887699dcac1c7f7_mafia_nionspy.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe"
        3⤵
        • Executes dropped EXE
        PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\wlogon32.exe

    Filesize

    288KB

    MD5

    cdb33acfc1ce467e62f4e6fdfa227f5b

    SHA1

    c97cafbf00dfaea11fe9bd0c380d502038690875

    SHA256

    0e3836ace9d67fb80a70b0c9553207f3e46432d8ee01550bcbedd5bdc39050c2

    SHA512

    24f28365bc9874703b1b16329840c30c43cb604808971c1e319bc8f6673086ae0e49283b0199e346ba9a04ae04e3778041b74ff85c1a89a81ceedf8fba4d97b2