Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows11_x64 -
resource
win11 -
submitted
21-08-2021 07:25
Static task
static1
Behavioral task
behavioral1
Sample
0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe
Resource
win11
Behavioral task
behavioral3
Sample
0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe
Resource
win10v20210410
General
-
Target
0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe
-
Size
2.4MB
-
MD5
6d0fd5f76fbe861695b140828aac6443
-
SHA1
71b54d8219ab3a44ac434c41495c8d0db62a7d3f
-
SHA256
0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98
-
SHA512
e85fc4cbb64b4abdb1d76322e66ee7a007e8fc13f3dc9bd6d485aa36be345fda2494e44c665768388e3fe5c6aaeafc4d0926a62d69c13a2d06409182711527a6
Malware Config
Signatures
-
StrongPity
StrongPity is a spyware developed by PROMETHIUM APT group mainly used in government sponsored attacks.
-
StrongPity Spyware 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000100000002b21a-150.dat family_strongpity behavioral2/files/0x000100000002b21a-151.dat family_strongpity -
Executes dropped EXE 4 IoCs
Processes:
fnmsetup.exenvwmisrv.exewinmsism.exefnmsetup.tmppid Process 4516 fnmsetup.exe 4508 nvwmisrv.exe 4984 winmsism.exe 4960 fnmsetup.tmp -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\CUpdateTask = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ndaData\\nvwmisrv.exe" 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe -
Modifies data under HKEY_USERS 43 IoCs
Processes:
sihclient.exesvchost.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exenvwmisrv.exefnmsetup.exedescription pid Process procid_target PID 4604 wrote to memory of 4516 4604 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe 80 PID 4604 wrote to memory of 4516 4604 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe 80 PID 4604 wrote to memory of 4516 4604 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe 80 PID 4604 wrote to memory of 4508 4604 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe 81 PID 4604 wrote to memory of 4508 4604 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe 81 PID 4604 wrote to memory of 4508 4604 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe 81 PID 4508 wrote to memory of 4984 4508 nvwmisrv.exe 83 PID 4508 wrote to memory of 4984 4508 nvwmisrv.exe 83 PID 4508 wrote to memory of 4984 4508 nvwmisrv.exe 83 PID 4516 wrote to memory of 4960 4516 fnmsetup.exe 84 PID 4516 wrote to memory of 4960 4516 fnmsetup.exe 84 PID 4516 wrote to memory of 4960 4516 fnmsetup.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe"C:\Users\Admin\AppData\Local\Temp\0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\fnmsetup.exe"C:\Users\Admin\AppData\Local\Temp\fnmsetup.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\is-ATGTK.tmp\fnmsetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-ATGTK.tmp\fnmsetup.tmp" /SL5="$70038,1480519,54272,C:\Users\Admin\AppData\Local\Temp\fnmsetup.exe"3⤵
- Executes dropped EXE
PID:4960
-
-
-
C:\Users\Admin\AppData\Local\Temp\ndaData\nvwmisrv.exe"C:\Users\Admin\AppData\Local\Temp\ndaData\nvwmisrv.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\ndaData\winmsism.exe"C:\Users\Admin\AppData\Local\Temp\ndaData\winmsism.exe"3⤵
- Executes dropped EXE
PID:4984
-
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv AQ4ciwWch0+5spMnjZvMow.0.21⤵
- Modifies data under HKEY_USERS
PID:3056
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:4588
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:5100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
65689075a82a08bb797bb9a5cc2932c9
SHA1a13b3baeedc3456bf8a03e6f7fd43b8ccfabc7e2
SHA256803b09f5863b583114d4db7d19ac0c5f64163c0075992bcfc289d27feea3a3ab
SHA51220a1ac3df849e09fe361d0de8c04f9d8598457e95427a30df9ab74316c2644aa30f782b88b171ffadd7be4b6fc85970ec539d003aa1244434be6a12bbb9b6ee6
-
MD5
65689075a82a08bb797bb9a5cc2932c9
SHA1a13b3baeedc3456bf8a03e6f7fd43b8ccfabc7e2
SHA256803b09f5863b583114d4db7d19ac0c5f64163c0075992bcfc289d27feea3a3ab
SHA51220a1ac3df849e09fe361d0de8c04f9d8598457e95427a30df9ab74316c2644aa30f782b88b171ffadd7be4b6fc85970ec539d003aa1244434be6a12bbb9b6ee6
-
MD5
8f144bcbcad0417e7823dd8e60218530
SHA19df092a764b8ad278ed574f00d1c065683eef6ac
SHA25639dfa032878743bba8244c73173c263e669131f0084a38f22c52b1383f627ba0
SHA512e093f69030fee17d8b55bde8337d409e8dfb583c97a81ed37425fb72122318d4c1f996d0d1bca28f24182ff5c8afe2be25eadc27951463ddca5c0abceca2a72d
-
MD5
8f144bcbcad0417e7823dd8e60218530
SHA19df092a764b8ad278ed574f00d1c065683eef6ac
SHA25639dfa032878743bba8244c73173c263e669131f0084a38f22c52b1383f627ba0
SHA512e093f69030fee17d8b55bde8337d409e8dfb583c97a81ed37425fb72122318d4c1f996d0d1bca28f24182ff5c8afe2be25eadc27951463ddca5c0abceca2a72d
-
MD5
388cc264ef91a905510d6c996983f0e6
SHA180c8f2a27e6f27cfdba00b372c28f34327992bdc
SHA256eb293da5b11589713e023decfbe15fd6cdb1c6d802ac62cd1f8b1464cd24b352
SHA5128677ac50026a94d0c323cf3d10c0388512b6feff0065b5343a328b71856ead43a4462ab41384466b24fd2869eb3d1b56354f88e541d4c98f35645cd3cccdf46c
-
MD5
f7ebb13afe40fbde41afab5bef509549
SHA1daa735b33a733d41d46e57dffec825bd6add7c0d
SHA2565106d80659087dcba4701bedb34845cf9c257e732aa6d76776d99fdf37fb2c8c
SHA512503f33236f585172ad304f1bcb78acdecc82db86d2e95daa8f832396463d616db007b1992d13c019375697aa2ecaf38637df2de281d84a2fcdb8a0ca9d4555a0
-
MD5
9efa863b1b4ac83046aa725010e59681
SHA17447531e65b896eefd550a4ec351bf0e3eaf866e
SHA2560c46d7c43b519e9b96971bcf86eac7a13b3e8785ae7ae92e7607c01ecd6b741e
SHA5129b9ddeb27a1f25afb8183516dc92cd74678a6271121e8861e04fd1941872eb0612f3c4afdf2cdb3c711339a1449922d6e6efd353436784d851519ec3f4b0acca
-
MD5
7ebc2cf82d7c7e702be7e7e6da5721b3
SHA1ab87604a19ceecc3e9b5fd8436005af526d6e586
SHA25681a445b4842da52811c51f9596a07046fcb466379c41a69218548e787468fb7b
SHA512de7e09d2b2ace4a889e8b76681354e381b225cc3b2c27aca58a05e853f78a134bcabff4907e489e9c45eee33fd49085103d5e2a4ec5a47e2b572f81af51f9679
-
MD5
1a3e6d95014d7cf0a676a2a68ce0e62a
SHA1e4833d543d400956a648c0a86f6a8eb6563fe417
SHA25673231d923dabadf72ef3437d54d1d09cd32b4a056793cf1f87fe938c389ef86b
SHA512c917a7e63d50dd66561ed9c756a3005c92601db1f8fc3b760d51a90dac2dafaeffde0701eaff7309a7ee3a091f05d77b7763742e0948a54026ddc5b2998df373
-
MD5
0f609dd490b21c85e9c8d1db8995e791
SHA130d448d7457818e4404b3b5e2079efa3d8d60bc3
SHA256dfd0f4b821438d8a9277728e42ab58bdc2667aa7173892ffd6ede75a5d5645f5
SHA5129f5951dc5c3b20c3faebb3bd0f8ad5c9ad1eba5dda2e45309d25600b5a8eaab90490fb06057e3c92b4ba89af8a61ae103840db3b23a5bc30b37c32d41487f79e
-
MD5
0f609dd490b21c85e9c8d1db8995e791
SHA130d448d7457818e4404b3b5e2079efa3d8d60bc3
SHA256dfd0f4b821438d8a9277728e42ab58bdc2667aa7173892ffd6ede75a5d5645f5
SHA5129f5951dc5c3b20c3faebb3bd0f8ad5c9ad1eba5dda2e45309d25600b5a8eaab90490fb06057e3c92b4ba89af8a61ae103840db3b23a5bc30b37c32d41487f79e
-
MD5
f050cfe9ded513f1b8e9a4846a0fa3a7
SHA164cb47c16c5636bdc5046107480aa3c7c97a2bf3
SHA256d9402b75daf385ed652cc1d8c3bf7f3ea306fbc16996dead5a8741eff4f54b2f
SHA51241d3b428696c41ac7dcefbd4fe7dbdb21977597fe906fff2e98ffa5a5bf32096bdad8b535aa0af961482d41a6ce843b4354fc7e5a0baf127f96806f2d53efb49
-
MD5
f050cfe9ded513f1b8e9a4846a0fa3a7
SHA164cb47c16c5636bdc5046107480aa3c7c97a2bf3
SHA256d9402b75daf385ed652cc1d8c3bf7f3ea306fbc16996dead5a8741eff4f54b2f
SHA51241d3b428696c41ac7dcefbd4fe7dbdb21977597fe906fff2e98ffa5a5bf32096bdad8b535aa0af961482d41a6ce843b4354fc7e5a0baf127f96806f2d53efb49