Analysis

  • max time kernel
    153s
  • max time network
    161s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 02:57

General

  • Target

    ea4b507c3236b56ef4ea44f5ac9a531a175d643d184e356ae8833d36c1957372.exe

  • Size

    8.3MB

  • MD5

    7b558126b8e488be2b33aeed7a330730

  • SHA1

    1d3819d1c8cba8a6ff5e83124291573145b46e4c

  • SHA256

    ea4b507c3236b56ef4ea44f5ac9a531a175d643d184e356ae8833d36c1957372

  • SHA512

    0274f537ec45054200285271e09b3ba9a4cfa5eaa2e610388d5cb9154ea7bb481b6daa5245b5eddc40b21ed4b4278b5e3d8170a53438a87c7bf1df43bfcc0962

Malware Config

Signatures

  • StrongPity

    StrongPity is a spyware developed by PROMETHIUM APT group mainly used in government sponsored attacks.

  • StrongPity Spyware 2 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea4b507c3236b56ef4ea44f5ac9a531a175d643d184e356ae8833d36c1957372.exe
    "C:\Users\Admin\AppData\Local\Temp\ea4b507c3236b56ef4ea44f5ac9a531a175d643d184e356ae8833d36c1957372.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Users\Admin\AppData\Local\Temp\idman633build2.exe
      "C:\Users\Admin\AppData\Local\Temp\idman633build2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3864
      • C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp
        "C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp" -d "C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\"
        3⤵
        • Executes dropped EXE
        PID:844
    • C:\Windows\SysWOW64\wvsvcs32.exe
      C:\Windows\system32\\wvsvcs32.exe help
      2⤵
      • Executes dropped EXE
      PID:3844
  • C:\Windows\SysWOW64\wvsvcs32.exe
    C:\Windows\SysWOW64\wvsvcs32.exe
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Windows\SysWOW64\printque.exe
      "C:\Windows\system32\\printque.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Users\Admin\AppData\Local\Temp\5AD-CA113D-416AA\sqlhostserv.xml
        "C:\Users\Admin\AppData\Local\Temp\5AD-CA113D-416AA\sqlhostserv.xml"
        3⤵
        • Executes dropped EXE
        PID:3096

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/844-180-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/3864-121-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB