Analysis

  • max time kernel
    123s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 18:59

General

  • Target

    2024-07-22_fee15c8df2f4e2e21308830600808156_mafia_nionspy.exe

  • Size

    274KB

  • MD5

    fee15c8df2f4e2e21308830600808156

  • SHA1

    3b0815b26cbc46863a99790cdf54d58655261bf1

  • SHA256

    9e78f8a9aca04f3b5e905f2b88c756e3a468293b8ded688918535045ee68860c

  • SHA512

    23719b2310b8ee4f6edf82c581fb49f1ce25f8d6e77928533a885489079ac2421b72201cbe8de9497f8d66bff20523ac1cb650086f0becd3d9530759bc9abdbb

  • SSDEEP

    6144:uYvZ6brUj+bvqHXSpWr2Kqz83Oad3Jg4PlPDIQ+KLzDDg:uYvEbrUjp3SpWggd3JBPlPDIQ3g

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-22_fee15c8df2f4e2e21308830600808156_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-22_fee15c8df2f4e2e21308830600808156_mafia_nionspy.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe"
        3⤵
        • Executes dropped EXE
        PID:1552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\dwmsys.exe

    Filesize

    274KB

    MD5

    3da1df09cc5c748810440fefe82e45ad

    SHA1

    1c3e095416a6eb3ae5054f459642baf7b38f9dbc

    SHA256

    2df7803a046683cccd144e94f71f50a722ab84ca8c97934464e111771a4924d1

    SHA512

    195ca25cfa9c66c2e431e2441c8160dd601d2979b05ad650ee7eb7754a8edb9f38a5be73cc4b0b9a5dc23227b3be8497e45ed775ee1b1eefeada2bb4b0abb656