Analysis
-
max time kernel
169s -
max time network
173s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 02:44
Static task
static1
Behavioral task
behavioral1
Sample
f8c953a9b737c5fe69ab9cfb5b20d576f15396a40de10ea6c3216042a97132f4.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f8c953a9b737c5fe69ab9cfb5b20d576f15396a40de10ea6c3216042a97132f4.exe
Resource
win10-en-20211208
General
-
Target
f8c953a9b737c5fe69ab9cfb5b20d576f15396a40de10ea6c3216042a97132f4.exe
-
Size
8.0MB
-
MD5
286175827543c48d2db0042944dbecc4
-
SHA1
46720f8f3bd61d1e9a6deb4b9968f8976567fd70
-
SHA256
f8c953a9b737c5fe69ab9cfb5b20d576f15396a40de10ea6c3216042a97132f4
-
SHA512
98c078e3f398cf0580b807d0b92d23362bb810271fbdaea5861b79932e75a73cccea4e65389743a81c6aad9f95dada7f8a34b3f25a8c54cbf1aacc35254e8b3e
Malware Config
Signatures
-
StrongPity
StrongPity is a spyware developed by PROMETHIUM APT group mainly used in government sponsored attacks.
-
StrongPity Spyware 2 IoCs
resource yara_rule behavioral2/files/0x000500000001ab15-122.dat family_strongpity behavioral2/files/0x000500000001ab15-123.dat family_strongpity -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
pid Process 948 5kplayer.exe 1980 rmaserv.exe 2992 rmaserv.exe 3192 winprint32.exe 3348 mssqldbserv.xml 3740 5kp.exe 3508 5kplayer_0.exe -
Loads dropped DLL 5 IoCs
pid Process 948 5kplayer.exe 3508 5kplayer_0.exe 3508 5kplayer_0.exe 3508 5kplayer_0.exe 3508 5kplayer_0.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\rmaserv.exe f8c953a9b737c5fe69ab9cfb5b20d576f15396a40de10ea6c3216042a97132f4.exe File created C:\Windows\SysWOW64\winprint32.exe f8c953a9b737c5fe69ab9cfb5b20d576f15396a40de10ea6c3216042a97132f4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3740 5kp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2992 rmaserv.exe 2992 rmaserv.exe 3740 5kp.exe 3740 5kp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3740 5kp.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 3740 5kp.exe 3740 5kp.exe 3740 5kp.exe 3740 5kp.exe 3740 5kp.exe 3740 5kp.exe 3740 5kp.exe 3740 5kp.exe 3740 5kp.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2832 wrote to memory of 948 2832 f8c953a9b737c5fe69ab9cfb5b20d576f15396a40de10ea6c3216042a97132f4.exe 69 PID 2832 wrote to memory of 948 2832 f8c953a9b737c5fe69ab9cfb5b20d576f15396a40de10ea6c3216042a97132f4.exe 69 PID 2832 wrote to memory of 948 2832 f8c953a9b737c5fe69ab9cfb5b20d576f15396a40de10ea6c3216042a97132f4.exe 69 PID 2832 wrote to memory of 1980 2832 f8c953a9b737c5fe69ab9cfb5b20d576f15396a40de10ea6c3216042a97132f4.exe 70 PID 2832 wrote to memory of 1980 2832 f8c953a9b737c5fe69ab9cfb5b20d576f15396a40de10ea6c3216042a97132f4.exe 70 PID 2832 wrote to memory of 1980 2832 f8c953a9b737c5fe69ab9cfb5b20d576f15396a40de10ea6c3216042a97132f4.exe 70 PID 2992 wrote to memory of 3192 2992 rmaserv.exe 72 PID 2992 wrote to memory of 3192 2992 rmaserv.exe 72 PID 2992 wrote to memory of 3192 2992 rmaserv.exe 72 PID 3192 wrote to memory of 3348 3192 winprint32.exe 73 PID 3192 wrote to memory of 3348 3192 winprint32.exe 73 PID 3192 wrote to memory of 3348 3192 winprint32.exe 73 PID 948 wrote to memory of 3740 948 5kplayer.exe 75 PID 948 wrote to memory of 3740 948 5kplayer.exe 75 PID 948 wrote to memory of 3740 948 5kplayer.exe 75 PID 3740 wrote to memory of 3508 3740 5kp.exe 79 PID 3740 wrote to memory of 3508 3740 5kp.exe 79 PID 3740 wrote to memory of 3508 3740 5kp.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8c953a9b737c5fe69ab9cfb5b20d576f15396a40de10ea6c3216042a97132f4.exe"C:\Users\Admin\AppData\Local\Temp\f8c953a9b737c5fe69ab9cfb5b20d576f15396a40de10ea6c3216042a97132f4.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\5kplayer.exe"C:\Users\Admin\AppData\Local\Temp\5kplayer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\5kplayer\5kp.exeC:\Users\Admin\AppData\Local\Temp\5kplayer\5kp.exe3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\5kplayer_0.exeC:\Users\Admin\AppData\Local\Temp\5kplayer_0.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3508
-
-
-
-
C:\Windows\SysWOW64\rmaserv.exeC:\Windows\system32\\rmaserv.exe help2⤵
- Executes dropped EXE
PID:1980
-
-
C:\Windows\SysWOW64\rmaserv.exeC:\Windows\SysWOW64\rmaserv.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\winprint32.exe"C:\Windows\system32\\winprint32.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\4CA-B25C11-A27BC\mssqldbserv.xml"C:\Users\Admin\AppData\Local\Temp\4CA-B25C11-A27BC\mssqldbserv.xml"3⤵
- Executes dropped EXE
PID:3348
-
-