Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe
-
Size
280KB
-
MD5
6f555069e8dc66ebd53d04189b46567a
-
SHA1
092b9711f4dbcbeb38f1de01f4497db495c1fd3f
-
SHA256
028f81d2ab866b944dab9a26e377a8b46230633581ce8a5bb9b182a6b5f6f85f
-
SHA512
3cdc3fba4176d256bf87fe7e6101c94bde24b1d83cb3aa8ca70d9c685c07462c8b5fd71e83aa5aab277b46452b1047b77da7946d3165edf6d861aef6e8b097a4
-
SSDEEP
6144:NQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:NQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2692 taskhostsys.exe 2584 taskhostsys.exe -
Loads dropped DLL 4 IoCs
pid Process 2252 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe 2252 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe 2252 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe 2692 taskhostsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhostsys.exe -
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\jitc\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\jitc\ = "Application" 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\jitc\shell\open 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.exe 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.exe\shell\open\command 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.exe\shell\runas 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\jitc\DefaultIcon\ = "%1" 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\jitc\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\taskhostsys.exe\" /START \"%1\" %*" 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.exe\shell\open 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\jitc\shell\runas\command 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\jitc\shell\runas 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\jitc 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\jitc\Content-Type = "application/x-msdownload" 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\jitc\shell 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\jitc\shell\runas\command\ = "\"%1\" %*" 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.exe\shell\runas\command 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\jitc\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.exe\DefaultIcon 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.exe\DefaultIcon\ = "%1" 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.exe\shell 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\jitc\DefaultIcon 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\jitc\shell\open\command 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.exe\ = "jitc" 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\taskhostsys.exe\" /START \"%1\" %*" 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2692 taskhostsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2692 2252 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe 30 PID 2252 wrote to memory of 2692 2252 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe 30 PID 2252 wrote to memory of 2692 2252 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe 30 PID 2252 wrote to memory of 2692 2252 2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe 30 PID 2692 wrote to memory of 2584 2692 taskhostsys.exe 31 PID 2692 wrote to memory of 2584 2692 taskhostsys.exe 31 PID 2692 wrote to memory of 2584 2692 taskhostsys.exe 31 PID 2692 wrote to memory of 2584 2692 taskhostsys.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-22_6f555069e8dc66ebd53d04189b46567a_mafia_nionspy.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SView\taskhostsys.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\taskhostsys.exe"3⤵
- Executes dropped EXE
PID:2584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD53e85648e1809efec144372554f1776df
SHA15ac6224cbd626e948dfa3dfbef3ac2cb3518e9b3
SHA256de82d0c25e7650b93542dc9c4ff45e787343119178deabb6441ba438c849aebf
SHA512e1852c469d0c92fc4c9d668285dde48eb0d5c2e89fdfd1bf33cace1f2b043c1ba68dd2ce85701e3796e13a8af9eebfffa8acd3587ebf45d38bb2b5ff0aaabd74