Static task
static1
Behavioral task
behavioral1
Sample
4235f33576b503faacbafb1b612f5fdf91fb406e73964f61064f232bd2b9c21c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
4235f33576b503faacbafb1b612f5fdf91fb406e73964f61064f232bd2b9c21c.exe
Resource
win10-en-20211208
General
-
Target
4235f33576b503faacbafb1b612f5fdf91fb406e73964f61064f232bd2b9c21c
-
Size
175KB
-
MD5
8ba4948ac1ef8c0e8b0e2d4099e119a3
-
SHA1
23fc35161ef867b8a5b0a4015d70da0f3b5817f2
-
SHA256
4235f33576b503faacbafb1b612f5fdf91fb406e73964f61064f232bd2b9c21c
-
SHA512
41aff4c62331c1bfaf1d67bc6e0ab4ebc1e4c3c30f67bebe54b2b4bac25ef79e3b4ad73a566bccdf2beeea9fe0a3cf4870a5d8932f0ee0f7952cdc2082b15436
-
SSDEEP
3072:nIzwZvCppL6enTLh35b3ImLeQgb5MjVs6duB63DochIPFJRAhP2EAeOtw:nIzwYL6en15I6JolDePA
Malware Config
Signatures
-
StrongPity Spyware 1 IoCs
Processes:
resource yara_rule sample family_strongpity -
Strongpity family
Files
-
4235f33576b503faacbafb1b612f5fdf91fb406e73964f61064f232bd2b9c21c.exe windows x86
343340d6b0a0d3967a63bacc4c0b8c8e
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
GetVolumeInformationW
FindFirstFileW
HeapFree
FindNextFileW
WriteFile
GetTempPathW
FindClose
CreateFileW
GetFileAttributesW
GetModuleHandleA
SetFileAttributesW
Sleep
DeleteFileW
CloseHandle
GetProcAddress
GetFileSize
ExitProcess
GetProcessHeap
CreateProcessW
GetTickCount
GetLastError
DecodePointer
EncodePointer
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapSize
GetStringTypeW
SetStdHandle
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RaiseException
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
GetModuleHandleExW
GetACP
HeapAlloc
HeapReAlloc
GetFileType
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
shlwapi
PathFindFileNameW
winhttp
WinHttpAddRequestHeaders
WinHttpQueryHeaders
WinHttpReadData
WinHttpOpenRequest
WinHttpSetOption
WinHttpOpen
WinHttpWriteData
WinHttpSendRequest
WinHttpQueryOption
WinHttpConnect
WinHttpCrackUrl
WinHttpReceiveResponse
WinHttpCloseHandle
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 240B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ