Analysis

  • max time kernel
    121s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 03:47

General

  • Target

    2024-09-06_130242798911d22b625e6328c8222b2f_mafia_nionspy.exe

  • Size

    280KB

  • MD5

    130242798911d22b625e6328c8222b2f

  • SHA1

    aa51fc010c06b95650ae7d3700f49c4ca18cd8ff

  • SHA256

    8e1d0c4f144478f1e343f134765bfd219718a5e63ff0cf96464381a825d40333

  • SHA512

    509bfe66007af02f2f63dc7e327eb2e331ef207a40c697fb5fc334f7f185d38f5e1740d0c0c0f5fb64a9da0f39c4c4a826555114e13ec668f857be9d958a9224

  • SSDEEP

    6144:TQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:TQMyfmNFHfnWfhLZVHmOog

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-06_130242798911d22b625e6328c8222b2f_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-06_130242798911d22b625e6328c8222b2f_mafia_nionspy.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe"
        3⤵
        • Executes dropped EXE
        PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\winit32.exe

    Filesize

    280KB

    MD5

    0ca29f4df65d782909db551d5ceae48c

    SHA1

    ce5286c76a91a7e25b1bc7c1c18a9b6c5bf59f42

    SHA256

    93daedd0bd75bc8ae39cfcb13e685f7d46ef6cabadca0827da9d49d9f024ddd0

    SHA512

    7e3592002383cdc4cfb7f93109b0cda5fd4b2696876feeb404602266762fcd2eab4c23e7240080ecc183d07eb0f99a0bad83030714683012e95111709d69887a