Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
24-01-2022 04:51
Static task
static1
Behavioral task
behavioral1
Sample
65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe
Resource
win10-en-20211208
General
-
Target
65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe
-
Size
9.2MB
-
MD5
2b9ef4ae5ebd8429d6d84c894ecc8fab
-
SHA1
eca4cebc30fcc93ee073185a7a6b2862c116fbd2
-
SHA256
65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab
-
SHA512
43f378cb70537a0cc30458a7044fb9cfa0debbfe43cdaeee96f4fc3d829370119fa0703460fff49c952fe0d7edc61033e57e0b2b5fdefeb13b4b643ff80355f0
Malware Config
Signatures
-
StrongPity
StrongPity is a spyware developed by PROMETHIUM APT group mainly used in government sponsored attacks.
-
StrongPity Spyware 3 IoCs
resource yara_rule behavioral1/files/0x000500000001416c-58.dat family_strongpity behavioral1/files/0x000500000001416c-56.dat family_strongpity behavioral1/files/0x000500000001416c-59.dat family_strongpity -
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 4 IoCs
pid Process 2236 intervpnmix2.exe 2252 sivsnui.exe 2280 srvolpsm.exe 2416 vpnpro.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vpnpro.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vpnpro.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Wine vpnpro.exe -
Loads dropped DLL 11 IoCs
pid Process 956 65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe 956 65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe 956 65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe 2252 sivsnui.exe 2236 intervpnmix2.exe 2236 intervpnmix2.exe 2236 intervpnmix2.exe 2236 intervpnmix2.exe 2236 intervpnmix2.exe 2416 vpnpro.exe 2416 vpnpro.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run 65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\Run\OperaSyncService = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Opera\\sivsnui.exe" 65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2416 vpnpro.exe -
Drops file in Program Files directory 52 IoCs
description ioc Process File created C:\Program Files (x86)\Innovative Solutions\Intervpn\vpnpro.ITA.lng intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\vpnpro.PTB.lng intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN\bin\liblzo2-2.dll intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN64\bin\libeay32.dll intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows\driver\OemWin2k.inf intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows64\bin\deltapall.bat intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows64\driver\OemWin2k.inf intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\vpnpro.ROM.lng intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN\bin\openssl.exe intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN\bin\test.ovpn intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows\driver\tap0901.cat intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows64\driver\System64Folder\DriverStore\FileRepository\oemwin2k.inf_amd64_5a1fec2fbbccefcc\oemwin2k.PNF intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows64\driver\System64Folder\DriverStore\FileRepository\oemwin2k.inf_amd64_5a1fec2fbbccefcc\tap0901.sys intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\stop_all.exe intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\unins000.dat intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows64\bin\addtap.bat intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\countries.tsv intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\innoupd.exe intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN\bin\openvpn-gui.exe intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN\bin\openvpn.exe intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN\bin\ssleay32.dll intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN\bin\superb.ovpn intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN64\bin\openssl.exe intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows\bin\deltapall.bat intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN\bin\openvpnserv.exe intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN\bin\vpn850936802.ovpn intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN64\bin\openvpn-gui.exe intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows\bin\addtap.bat intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows\bin\tapinstall.exe intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows\driver\OemVista.inf intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows\driver\tap0901.sys intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\memmgrset.dll intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\vpnpro.RUS.lng intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN\bin\libpkcs11-helper-1.dll intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN64\bin\openvpnserv.exe intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows64\bin\devcon.exe intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows64\driver\tap0901.cat intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows64\driver\System64Folder\DriverStore\FileRepository\oemwin2k.inf_amd64_5a1fec2fbbccefcc\tap0901.cat intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\unins000.exe intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\vpnpro.exe intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\vpnpro.ntv.lng intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN\bin\japonia.ovpn intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN\bin\Intervpn\vpnpro.exe intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN64\bin\libpkcs11-helper-1.dll intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows\bin\devcon.exe intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows64\driver\tap0901.sys intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\vpnpro.FIN.lng intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN\bin\libeay32.dll intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN64\bin\liblzo2-2.dll intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN64\bin\openvpn.exe intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN64\bin\ssleay32.dll intervpnmix2.exe File created C:\Program Files (x86)\Innovative Solutions\Intervpn\TAP-Windows64\driver\System64Folder\DriverStore\FileRepository\oemwin2k.inf_amd64_5a1fec2fbbccefcc\oemwin2k.inf intervpnmix2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\INF\oem59.PNF intervpnmix2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vpnpro.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vpnpro.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 vpnpro.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 vpnpro.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 vpnpro.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2416 vpnpro.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 956 wrote to memory of 2236 956 65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe 27 PID 956 wrote to memory of 2236 956 65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe 27 PID 956 wrote to memory of 2236 956 65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe 27 PID 956 wrote to memory of 2236 956 65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe 27 PID 956 wrote to memory of 2236 956 65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe 27 PID 956 wrote to memory of 2236 956 65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe 27 PID 956 wrote to memory of 2236 956 65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe 27 PID 956 wrote to memory of 2252 956 65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe 28 PID 956 wrote to memory of 2252 956 65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe 28 PID 956 wrote to memory of 2252 956 65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe 28 PID 956 wrote to memory of 2252 956 65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe 28 PID 2252 wrote to memory of 2280 2252 sivsnui.exe 29 PID 2252 wrote to memory of 2280 2252 sivsnui.exe 29 PID 2252 wrote to memory of 2280 2252 sivsnui.exe 29 PID 2252 wrote to memory of 2280 2252 sivsnui.exe 29 PID 2236 wrote to memory of 2416 2236 intervpnmix2.exe 31 PID 2236 wrote to memory of 2416 2236 intervpnmix2.exe 31 PID 2236 wrote to memory of 2416 2236 intervpnmix2.exe 31 PID 2236 wrote to memory of 2416 2236 intervpnmix2.exe 31 PID 2236 wrote to memory of 2416 2236 intervpnmix2.exe 31 PID 2236 wrote to memory of 2416 2236 intervpnmix2.exe 31 PID 2236 wrote to memory of 2416 2236 intervpnmix2.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe"C:\Users\Admin\AppData\Local\Temp\65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\intervpnmix2.exe"C:\Users\Admin\AppData\Local\Temp\intervpnmix2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN\bin\Intervpn\vpnpro.exe"C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN\bin\Intervpn\vpnpro.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
-
C:\Users\Admin\AppData\Local\Temp\Opera\sivsnui.exe"C:\Users\Admin\AppData\Local\Temp\Opera\sivsnui.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Opera\srvolpsm.exe"C:\Users\Admin\AppData\Local\Temp\Opera\srvolpsm.exe"3⤵
- Executes dropped EXE
PID:2280
-
-