Analysis
-
max time kernel
4294200s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
06-03-2022 06:51
Static task
static1
Behavioral task
behavioral1
Sample
d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe
Resource
win10v2004-en-20220112
General
-
Target
d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe
-
Size
2.4MB
-
MD5
469c0460e4c1fefd01db4ae9f79c53c7
-
SHA1
975e5ac0f82b26eb4df8c718207c61dd8afee9ff
-
SHA256
d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78
-
SHA512
d7a109e33abd2f6383c50b973db5c252f5c6e0b0c079ba1b5ccd3281e4e73b43422236149d8cdf76842f4c4ccabc07a34bc23c46c2f01715afb29436464af0ec
Malware Config
Signatures
-
StrongPity
StrongPity is a spyware developed by PROMETHIUM APT group mainly used in government sponsored attacks.
-
StrongPity Spyware 3 IoCs
resource yara_rule behavioral1/files/0x000700000001310c-66.dat family_strongpity behavioral1/files/0x000700000001310c-68.dat family_strongpity behavioral1/files/0x000700000001310c-67.dat family_strongpity -
Executes dropped EXE 4 IoCs
pid Process 528 fnmsetup.exe 1488 fnmsetup.tmp 1544 nvwmisrv.exe 868 winmsism.exe -
Loads dropped DLL 7 IoCs
pid Process 1236 d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe 528 fnmsetup.exe 1488 fnmsetup.tmp 1488 fnmsetup.tmp 1236 d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe 1236 d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe 1544 nvwmisrv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Windows\CurrentVersion\Run d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Windows\CurrentVersion\Run\KeyStoreUpdater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ndaData\\nvwmisrv.exe" d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1488 fnmsetup.tmp -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1236 wrote to memory of 528 1236 d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe 27 PID 1236 wrote to memory of 528 1236 d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe 27 PID 1236 wrote to memory of 528 1236 d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe 27 PID 1236 wrote to memory of 528 1236 d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe 27 PID 1236 wrote to memory of 528 1236 d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe 27 PID 1236 wrote to memory of 528 1236 d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe 27 PID 1236 wrote to memory of 528 1236 d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe 27 PID 528 wrote to memory of 1488 528 fnmsetup.exe 28 PID 528 wrote to memory of 1488 528 fnmsetup.exe 28 PID 528 wrote to memory of 1488 528 fnmsetup.exe 28 PID 528 wrote to memory of 1488 528 fnmsetup.exe 28 PID 528 wrote to memory of 1488 528 fnmsetup.exe 28 PID 528 wrote to memory of 1488 528 fnmsetup.exe 28 PID 528 wrote to memory of 1488 528 fnmsetup.exe 28 PID 1236 wrote to memory of 1544 1236 d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe 29 PID 1236 wrote to memory of 1544 1236 d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe 29 PID 1236 wrote to memory of 1544 1236 d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe 29 PID 1236 wrote to memory of 1544 1236 d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe 29 PID 1544 wrote to memory of 868 1544 nvwmisrv.exe 31 PID 1544 wrote to memory of 868 1544 nvwmisrv.exe 31 PID 1544 wrote to memory of 868 1544 nvwmisrv.exe 31 PID 1544 wrote to memory of 868 1544 nvwmisrv.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe"C:\Users\Admin\AppData\Local\Temp\d9120629675b34e1a33b9bd34fadd0249ce1a903d510045565c31769e4881e78.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\fnmsetup.exe"C:\Users\Admin\AppData\Local\Temp\fnmsetup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\is-2G25K.tmp\fnmsetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-2G25K.tmp\fnmsetup.tmp" /SL5="$40152,1480519,54272,C:\Users\Admin\AppData\Local\Temp\fnmsetup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1488
-
-
-
C:\Users\Admin\AppData\Local\Temp\ndaData\nvwmisrv.exe"C:\Users\Admin\AppData\Local\Temp\ndaData\nvwmisrv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\ndaData\winmsism.exe"C:\Users\Admin\AppData\Local\Temp\ndaData\winmsism.exe"3⤵
- Executes dropped EXE
PID:868
-
-