Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe
-
Size
274KB
-
MD5
0bf838c98733370d4052ee70f858987e
-
SHA1
7b1f035b53fe21375a3498522c438191768303b7
-
SHA256
a4025a364255204c74f5693a194538b873d5ebda99cec21b316b5ddc7697233a
-
SHA512
768221f8e4d598f2e6808e56dd2ba15ff7c34b5ab8151aeed8702d437ab72b92db30a423f6802fb37513640cd74e8a7964b45f4dbda3d537ab687606707dd170
-
SSDEEP
6144:WYvZ6brUj+bvqHXSpWr2Kqz83Oad3Jg4PlPDIQ+KLzDDg:WYvEbrUjp3SpWggd3JBPlPDIQ3g
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 3644 taskhostsys.exe 4600 taskhostsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhostsys.exe -
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\.exe\shell\runas 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\jitc\shell\open\command 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\jitc\shell\runas\command\ = "\"%1\" %*" 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\taskhostsys.exe\" /START \"%1\" %*" 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\jitc\shell\runas\command 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\jitc\shell\runas 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\jitc\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\taskhostsys.exe\" /START \"%1\" %*" 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\.exe\DefaultIcon 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\.exe 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\jitc 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\jitc\DefaultIcon\ = "%1" 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\jitc\shell 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\jitc\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\.exe\ = "jitc" 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\.exe\shell\open 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\jitc\DefaultIcon 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\jitc\shell\open 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\jitc\Content-Type = "application/x-msdownload" 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\jitc\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\.exe\shell\open\command 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\jitc\ = "Application" 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\.exe\shell 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\.exe\shell\runas\command 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3644 taskhostsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2396 wrote to memory of 3644 2396 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe 89 PID 2396 wrote to memory of 3644 2396 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe 89 PID 2396 wrote to memory of 3644 2396 2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe 89 PID 3644 wrote to memory of 4600 3644 taskhostsys.exe 90 PID 3644 wrote to memory of 4600 3644 taskhostsys.exe 90 PID 3644 wrote to memory of 4600 3644 taskhostsys.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-19_0bf838c98733370d4052ee70f858987e_mafia_nionspy.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\taskhostsys.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\taskhostsys.exe"3⤵
- Executes dropped EXE
PID:4600
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4236,i,12198811467968044966,17227406646827438786,262144 --variations-seed-version --mojo-platform-channel-handle=4072 /prefetch:81⤵PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD5fe4670b2d497b735ed772d8d5f94db28
SHA159c8e40198f1ff277f2d9c454113556962b86dfa
SHA25683e79f09ed182c9f073fab7d52ea0d5cc98cbfd2d4120fa1c56d16b0b27ccdb6
SHA5121749943fc14f810faebb2151de09ed7bdf98d4c4e8965efa8ad99fa7049c1d706405fe7416ca50061801d450fcaca6e2b0273279aa40c0bbc32fe58b239be99c