Analysis

  • max time kernel
    121s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2024 01:22

General

  • Target

    2024-09-25_2ce0ec7605e8759b43d7ec5981c45f66_mafia_nionspy.exe

  • Size

    280KB

  • MD5

    2ce0ec7605e8759b43d7ec5981c45f66

  • SHA1

    e39c2fe04746ce6fdb4ec230d194c92cf5cbcb95

  • SHA256

    ddfa12e235e2fb7392a3a8d31811e7dc49fb2924ffdc36142ff04223d7f71f78

  • SHA512

    5ebd2b03bb4c06de5f6a12eb89f81f1fde477587809987c3d49d790be2c60cedc35240b41f12b15661af628f78f9d8c7556b367979fab54b3f2796e7a9b533a4

  • SSDEEP

    6144:WTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:WTBPFV0RyWl3h2E+7pl

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-25_2ce0ec7605e8759b43d7ec5981c45f66_mafia_nionspy.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-25_2ce0ec7605e8759b43d7ec5981c45f66_mafia_nionspy.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\taskhostsys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\taskhostsys.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3768
      • C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\taskhostsys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\taskhostsys.exe"
        3⤵
        • Executes dropped EXE
        PID:3680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\taskhostsys.exe

    Filesize

    280KB

    MD5

    04ca9604023c55faf0179bc91b49cd52

    SHA1

    7b56904809220db7be611ce71257c5c639868af3

    SHA256

    c9551dfe2ff680cafe1ae68f8d862367154f135543bc0b38a00f4ea2732adc94

    SHA512

    adc9010be2842b18b9543a8cd9f054e0880ba892a07f56d500d2ef254fe7fccd06d8c26d7f4235ac76f239332bbbf556a391be27cd8c153ca19cea41087c2934