Analysis
-
max time kernel
161s -
max time network
167s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 22:27
Static task
static1
Behavioral task
behavioral1
Sample
0de13f1d74dda01de51794c0b559eb528c972e6dcb18fe873207275940cc16b3.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0de13f1d74dda01de51794c0b559eb528c972e6dcb18fe873207275940cc16b3.exe
Resource
win10-en-20211208
General
-
Target
0de13f1d74dda01de51794c0b559eb528c972e6dcb18fe873207275940cc16b3.exe
-
Size
8.3MB
-
MD5
0d7c16ad2aaf62172aead5455f93e38c
-
SHA1
9836b713ec9f984815c2a8dfe2d0213234a27700
-
SHA256
0de13f1d74dda01de51794c0b559eb528c972e6dcb18fe873207275940cc16b3
-
SHA512
5540bd21915e7d5b4eb1bacfbd91c4e30eb1ea83f1e811943779e166c88f74917c01c605224fae949c3c9358cd038a0de810bd4f6eccc0c44b0536731fb2e390
Malware Config
Signatures
-
StrongPity
StrongPity is a spyware developed by PROMETHIUM APT group mainly used in government sponsored attacks.
-
StrongPity Spyware 2 IoCs
resource yara_rule behavioral2/files/0x000500000001ab2d-120.dat family_strongpity behavioral2/files/0x000500000001ab2d-121.dat family_strongpity -
Executes dropped EXE 6 IoCs
pid Process 3692 idman633build2.exe 3888 wvsvcs32.exe 1332 wvsvcs32.exe 8 printque.exe 2140 sqlhostserv.xml 3520 IDM1.tmp -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\printque.exe 0de13f1d74dda01de51794c0b559eb528c972e6dcb18fe873207275940cc16b3.exe File created C:\Windows\SysWOW64\wvsvcs32.exe 0de13f1d74dda01de51794c0b559eb528c972e6dcb18fe873207275940cc16b3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1332 wvsvcs32.exe 1332 wvsvcs32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1332 wvsvcs32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2552 wrote to memory of 3692 2552 0de13f1d74dda01de51794c0b559eb528c972e6dcb18fe873207275940cc16b3.exe 69 PID 2552 wrote to memory of 3692 2552 0de13f1d74dda01de51794c0b559eb528c972e6dcb18fe873207275940cc16b3.exe 69 PID 2552 wrote to memory of 3692 2552 0de13f1d74dda01de51794c0b559eb528c972e6dcb18fe873207275940cc16b3.exe 69 PID 2552 wrote to memory of 3888 2552 0de13f1d74dda01de51794c0b559eb528c972e6dcb18fe873207275940cc16b3.exe 70 PID 2552 wrote to memory of 3888 2552 0de13f1d74dda01de51794c0b559eb528c972e6dcb18fe873207275940cc16b3.exe 70 PID 2552 wrote to memory of 3888 2552 0de13f1d74dda01de51794c0b559eb528c972e6dcb18fe873207275940cc16b3.exe 70 PID 1332 wrote to memory of 8 1332 wvsvcs32.exe 72 PID 1332 wrote to memory of 8 1332 wvsvcs32.exe 72 PID 1332 wrote to memory of 8 1332 wvsvcs32.exe 72 PID 8 wrote to memory of 2140 8 printque.exe 73 PID 8 wrote to memory of 2140 8 printque.exe 73 PID 8 wrote to memory of 2140 8 printque.exe 73 PID 3692 wrote to memory of 3520 3692 idman633build2.exe 75 PID 3692 wrote to memory of 3520 3692 idman633build2.exe 75 PID 3692 wrote to memory of 3520 3692 idman633build2.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\0de13f1d74dda01de51794c0b559eb528c972e6dcb18fe873207275940cc16b3.exe"C:\Users\Admin\AppData\Local\Temp\0de13f1d74dda01de51794c0b559eb528c972e6dcb18fe873207275940cc16b3.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\idman633build2.exe"C:\Users\Admin\AppData\Local\Temp\idman633build2.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp"C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp" -d "C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\"3⤵
- Executes dropped EXE
PID:3520
-
-
-
C:\Windows\SysWOW64\wvsvcs32.exeC:\Windows\system32\\wvsvcs32.exe help2⤵
- Executes dropped EXE
PID:3888
-
-
C:\Windows\SysWOW64\wvsvcs32.exeC:\Windows\SysWOW64\wvsvcs32.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\printque.exe"C:\Windows\system32\\printque.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\5AD-CA113D-416AA\sqlhostserv.xml"C:\Users\Admin\AppData\Local\Temp\5AD-CA113D-416AA\sqlhostserv.xml"3⤵
- Executes dropped EXE
PID:2140
-
-