Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/08/2024, 12:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe
-
Size
288KB
-
MD5
0e505ee395cf88191e49ca9e4d823ade
-
SHA1
67b02054b7c416317a28f03710ef9ddd1e1d8d1a
-
SHA256
ffa1c7fcd746a41aaee73171d8681e51383030dfd2bd888b83ed2583e54b1adb
-
SHA512
2a5490b49c42211d28db14070a18381bdff248b49a94f8c3073bc17599b5ce2c0421758f931c79a65b1c48754f23cca9689322cf58660fd64e208d0e234e42ec
-
SSDEEP
6144:EQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:EQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2784 sidebar2.exe 2712 sidebar2.exe -
Loads dropped DLL 4 IoCs
pid Process 2692 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe 2692 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe 2692 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe 2784 sidebar2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sidebar2.exe -
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\prochost\DefaultIcon\ = "%1" 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\prochost\shell\open 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\prochost\DefaultIcon 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\sidebar2.exe\" /START \"%1\" %*" 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\runas\command 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\prochost\shell\runas\command 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\prochost\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\sidebar2.exe\" /START \"%1\" %*" 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\ = "prochost" 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\DefaultIcon 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\prochost\shell\open\command 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\open\command 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\open 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\prochost 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\prochost\shell\runas 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\prochost\Content-Type = "application/x-msdownload" 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\prochost\shell 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\prochost\ = "Application" 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\prochost\shell\runas\command\ = "\"%1\" %*" 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\prochost\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\runas 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\prochost\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2784 sidebar2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2784 2692 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe 30 PID 2692 wrote to memory of 2784 2692 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe 30 PID 2692 wrote to memory of 2784 2692 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe 30 PID 2692 wrote to memory of 2784 2692 2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe 30 PID 2784 wrote to memory of 2712 2784 sidebar2.exe 31 PID 2784 wrote to memory of 2712 2784 sidebar2.exe 31 PID 2784 wrote to memory of 2712 2784 sidebar2.exe 31 PID 2784 wrote to memory of 2712 2784 sidebar2.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-08_0e505ee395cf88191e49ca9e4d823ade_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\sidebar2.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SView\sidebar2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\sidebar2.exe"3⤵
- Executes dropped EXE
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5f4d2c709007fdb381765e971901919fc
SHA18ff2d8a1765f579d5e6dfc99c98dc55203e3835c
SHA2564f33047b2605fda35be1b2e0a82ca36cbb53fec565050af140e01fc590e36acf
SHA51250d1d1ccdfc44e5afeafe53c95692aeb527d77d7d2a933074270b3fe0cbe65e5a50d1491ba413747bee4feadb1b0cc42141ec582d2bad3f4b2bc53fcaca84d91