Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09/04/2021, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
4ef9f634f3c2bcda5eb99a58a1f7d4619fd5cd166b4154242fe88ab794a0c847.bin.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
4ef9f634f3c2bcda5eb99a58a1f7d4619fd5cd166b4154242fe88ab794a0c847.bin.exe
Resource
win10v20201028
General
-
Target
4ef9f634f3c2bcda5eb99a58a1f7d4619fd5cd166b4154242fe88ab794a0c847.bin.exe
-
Size
4.8MB
-
MD5
cd808dc04c0f37c12e86183d4ef05b62
-
SHA1
da9a80127e455854c5b7d4eaec8f7f48b22e3e3d
-
SHA256
4ef9f634f3c2bcda5eb99a58a1f7d4619fd5cd166b4154242fe88ab794a0c847
-
SHA512
4d9fd6ce526ff3e0d0614fc8e13e6d314b95501e240dd7a479106b646c559171f614a7ed4d44a4b71f8f1c02fc07f01e5f51a7d5f977a8fc6cdc86643b8644e9
Malware Config
Signatures
-
StrongPity
StrongPity is a spyware developed by PROMETHIUM APT group mainly used in government sponsored attacks.
-
StrongPity Spyware 2 IoCs
resource yara_rule behavioral2/files/0x000100000001ab3c-118.dat family_strongpity behavioral2/files/0x000100000001ab3c-119.dat family_strongpity -
Executes dropped EXE 4 IoCs
pid Process 4892 fnmsetup.exe 4908 nvwmisrv.exe 5044 winmsism.exe 5088 fnmsetup.tmp -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run 4ef9f634f3c2bcda5eb99a58a1f7d4619fd5cd166b4154242fe88ab794a0c847.bin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\CUpdateTask = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ndaData\\nvwmisrv.exe" 4ef9f634f3c2bcda5eb99a58a1f7d4619fd5cd166b4154242fe88ab794a0c847.bin.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4696 wrote to memory of 4892 4696 4ef9f634f3c2bcda5eb99a58a1f7d4619fd5cd166b4154242fe88ab794a0c847.bin.exe 71 PID 4696 wrote to memory of 4892 4696 4ef9f634f3c2bcda5eb99a58a1f7d4619fd5cd166b4154242fe88ab794a0c847.bin.exe 71 PID 4696 wrote to memory of 4892 4696 4ef9f634f3c2bcda5eb99a58a1f7d4619fd5cd166b4154242fe88ab794a0c847.bin.exe 71 PID 4696 wrote to memory of 4908 4696 4ef9f634f3c2bcda5eb99a58a1f7d4619fd5cd166b4154242fe88ab794a0c847.bin.exe 74 PID 4696 wrote to memory of 4908 4696 4ef9f634f3c2bcda5eb99a58a1f7d4619fd5cd166b4154242fe88ab794a0c847.bin.exe 74 PID 4696 wrote to memory of 4908 4696 4ef9f634f3c2bcda5eb99a58a1f7d4619fd5cd166b4154242fe88ab794a0c847.bin.exe 74 PID 4908 wrote to memory of 5044 4908 nvwmisrv.exe 75 PID 4908 wrote to memory of 5044 4908 nvwmisrv.exe 75 PID 4908 wrote to memory of 5044 4908 nvwmisrv.exe 75 PID 4892 wrote to memory of 5088 4892 fnmsetup.exe 76 PID 4892 wrote to memory of 5088 4892 fnmsetup.exe 76 PID 4892 wrote to memory of 5088 4892 fnmsetup.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ef9f634f3c2bcda5eb99a58a1f7d4619fd5cd166b4154242fe88ab794a0c847.bin.exe"C:\Users\Admin\AppData\Local\Temp\4ef9f634f3c2bcda5eb99a58a1f7d4619fd5cd166b4154242fe88ab794a0c847.bin.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\fnmsetup.exe"C:\Users\Admin\AppData\Local\Temp\fnmsetup.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\is-0P9HP.tmp\fnmsetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-0P9HP.tmp\fnmsetup.tmp" /SL5="$501CC,1480519,54272,C:\Users\Admin\AppData\Local\Temp\fnmsetup.exe"3⤵
- Executes dropped EXE
PID:5088
-
-
-
C:\Users\Admin\AppData\Local\Temp\ndaData\nvwmisrv.exe"C:\Users\Admin\AppData\Local\Temp\ndaData\nvwmisrv.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\ndaData\winmsism.exe"C:\Users\Admin\AppData\Local\Temp\ndaData\winmsism.exe"3⤵
- Executes dropped EXE
PID:5044
-
-