Analysis

  • max time kernel
    189s
  • max time network
    180s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 04:51

General

  • Target

    65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe

  • Size

    9.2MB

  • MD5

    2b9ef4ae5ebd8429d6d84c894ecc8fab

  • SHA1

    eca4cebc30fcc93ee073185a7a6b2862c116fbd2

  • SHA256

    65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab

  • SHA512

    43f378cb70537a0cc30458a7044fb9cfa0debbfe43cdaeee96f4fc3d829370119fa0703460fff49c952fe0d7edc61033e57e0b2b5fdefeb13b4b643ff80355f0

Malware Config

Signatures

  • StrongPity

    StrongPity is a spyware developed by PROMETHIUM APT group mainly used in government sponsored attacks.

  • StrongPity Spyware 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 52 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe
    "C:\Users\Admin\AppData\Local\Temp\65041a83c88ba90e489de8ac275688815c51b93ae568c627b74fc160d2db6bab.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Users\Admin\AppData\Local\Temp\intervpnmix2.exe
      "C:\Users\Admin\AppData\Local\Temp\intervpnmix2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3264
      • C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN\bin\Intervpn\vpnpro.exe
        "C:\Program Files (x86)\Innovative Solutions\Intervpn\OpenVPN\bin\Intervpn\vpnpro.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:3588
    • C:\Users\Admin\AppData\Local\Temp\Opera\sivsnui.exe
      "C:\Users\Admin\AppData\Local\Temp\Opera\sivsnui.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:964
      • C:\Users\Admin\AppData\Local\Temp\Opera\srvolpsm.exe
        "C:\Users\Admin\AppData\Local\Temp\Opera\srvolpsm.exe"
        3⤵
        • Executes dropped EXE
        PID:880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3588-130-0x000000000A210000-0x000000000A211000-memory.dmp

    Filesize

    4KB

  • memory/3588-123-0x0000000077CF0000-0x0000000077E7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3588-125-0x000000000A1C0000-0x000000000A1C1000-memory.dmp

    Filesize

    4KB

  • memory/3588-124-0x000000000A220000-0x000000000A221000-memory.dmp

    Filesize

    4KB

  • memory/3588-127-0x000000000A200000-0x000000000A201000-memory.dmp

    Filesize

    4KB

  • memory/3588-126-0x000000000A250000-0x000000000A251000-memory.dmp

    Filesize

    4KB

  • memory/3588-129-0x000000000A1F0000-0x000000000A1F1000-memory.dmp

    Filesize

    4KB

  • memory/3588-128-0x000000000A230000-0x000000000A231000-memory.dmp

    Filesize

    4KB

  • memory/3588-144-0x000000000A4F0000-0x000000000A4F1000-memory.dmp

    Filesize

    4KB

  • memory/3588-131-0x000000000A390000-0x000000000A391000-memory.dmp

    Filesize

    4KB

  • memory/3588-133-0x000000000A240000-0x000000000A241000-memory.dmp

    Filesize

    4KB

  • memory/3588-132-0x0000000000400000-0x0000000000912000-memory.dmp

    Filesize

    5.1MB

  • memory/3588-134-0x000000000A1D0000-0x000000000A1D1000-memory.dmp

    Filesize

    4KB

  • memory/3588-135-0x000000000A3B0000-0x000000000A3B1000-memory.dmp

    Filesize

    4KB

  • memory/3588-136-0x000000000A4A0000-0x000000000A4A1000-memory.dmp

    Filesize

    4KB

  • memory/3588-137-0x000000000A360000-0x000000000A361000-memory.dmp

    Filesize

    4KB

  • memory/3588-138-0x000000000A2F0000-0x000000000A2F1000-memory.dmp

    Filesize

    4KB

  • memory/3588-139-0x000000000A340000-0x000000000A341000-memory.dmp

    Filesize

    4KB

  • memory/3588-140-0x000000000A4D0000-0x000000000A4D1000-memory.dmp

    Filesize

    4KB

  • memory/3588-141-0x000000000A4C0000-0x000000000A4C1000-memory.dmp

    Filesize

    4KB

  • memory/3588-142-0x000000000A450000-0x000000000A451000-memory.dmp

    Filesize

    4KB

  • memory/3588-143-0x000000000A3E0000-0x000000000A3E1000-memory.dmp

    Filesize

    4KB