Analysis

  • max time kernel
    9s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    15-07-2021 18:02

General

  • Target

    57933bc5c60de83fddbc7a2c6522e6481c9e684e342fed86a4c38bf08c4a6b0f.exe

  • Size

    1.2MB

  • MD5

    63533e07c471cf29ce6fc5887e933494

  • SHA1

    01eea47a0f55b7df7d8275110fa159e5b82be64e

  • SHA256

    57933bc5c60de83fddbc7a2c6522e6481c9e684e342fed86a4c38bf08c4a6b0f

  • SHA512

    a3ad09374b933b11a26864d931fd5324443f68b15492767c44ad1da826e80f391796e8aeecc210bfd2c7d1facc72462fd3b96aa3a541eacf2a23e44026b820ec

Malware Config

Extracted

Family

pony

C2

http://www.ptsinar.co/ymg/apisiylo/gate.php

Attributes
  • payload_url

    http://www.ptsinar.co/ymg/apisiylo/shit.exe

Signatures

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Executes dropped EXE 2 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57933bc5c60de83fddbc7a2c6522e6481c9e684e342fed86a4c38bf08c4a6b0f.exe
    "C:\Users\Admin\AppData\Local\Temp\57933bc5c60de83fddbc7a2c6522e6481c9e684e342fed86a4c38bf08c4a6b0f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Users\Admin\AppData\Local\Temp\Resm1.exe
      "C:\Users\Admin\AppData\Local\Temp\Resm1.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:520
      • C:\Users\Admin\AppData\Local\Temp\Resm1.exe
        "C:\Users\Admin\AppData\Local\Temp\Resm1.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:628
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\259335126.bat" "C:\Users\Admin\AppData\Local\Temp\Resm1.exe" "
          4⤵
            PID:1020

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Virtualization/Sandbox Evasion

    2
    T1497

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    4
    T1012

    Virtualization/Sandbox Evasion

    2
    T1497

    System Information Discovery

    3
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\259335126.bat
      MD5

      3880eeb1c736d853eb13b44898b718ab

      SHA1

      4eec9d50360cd815211e3c4e6bdd08271b6ec8e6

      SHA256

      936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7

      SHA512

      3eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b

    • C:\Users\Admin\AppData\Local\Temp\Resm1.exe
      MD5

      d8e14a9ccc62c5521cc0185e70a4b3ac

      SHA1

      dee2d62258264afe66e20434658b66bc8bbcc317

      SHA256

      2f481a7ba5a0016e2cdcc9ba3ac91cf9fe00f00bd5726aba3b0d0cf3d155d357

      SHA512

      8e47a49f4b19b2ec36ea6897accaa10a2c331c59eecc8dcd56d45f16aca003ad8d544ec32f8694e8e6de68cad1a33194e9ff72f50b214fbc6294680604692920

    • C:\Users\Admin\AppData\Local\Temp\Resm1.exe
      MD5

      d8e14a9ccc62c5521cc0185e70a4b3ac

      SHA1

      dee2d62258264afe66e20434658b66bc8bbcc317

      SHA256

      2f481a7ba5a0016e2cdcc9ba3ac91cf9fe00f00bd5726aba3b0d0cf3d155d357

      SHA512

      8e47a49f4b19b2ec36ea6897accaa10a2c331c59eecc8dcd56d45f16aca003ad8d544ec32f8694e8e6de68cad1a33194e9ff72f50b214fbc6294680604692920

    • C:\Users\Admin\AppData\Local\Temp\Resm1.exe
      MD5

      d8e14a9ccc62c5521cc0185e70a4b3ac

      SHA1

      dee2d62258264afe66e20434658b66bc8bbcc317

      SHA256

      2f481a7ba5a0016e2cdcc9ba3ac91cf9fe00f00bd5726aba3b0d0cf3d155d357

      SHA512

      8e47a49f4b19b2ec36ea6897accaa10a2c331c59eecc8dcd56d45f16aca003ad8d544ec32f8694e8e6de68cad1a33194e9ff72f50b214fbc6294680604692920

    • C:\Users\Admin\AppData\Local\Temp\Resm2.jpg
      MD5

      cd7dab4af922c2e5c7d03a0e0d973b37

      SHA1

      0bce45fe7d0eb0b5da797fac00d5fc639c3570d2

      SHA256

      11e58d94f929782e1267df6d8bde5dc781320fb6082acaefda6352880fda7674

      SHA512

      0868a97478b73ad78d9c43365f92ccffdfb999bef4d0293de57cba138db3cfccce1de6e6422d50ec0bd03ca9acbcd64082254860bec0d1a7241d34f135ecaf9d

    • \Users\Admin\AppData\Local\Temp\Resm1.exe
      MD5

      d8e14a9ccc62c5521cc0185e70a4b3ac

      SHA1

      dee2d62258264afe66e20434658b66bc8bbcc317

      SHA256

      2f481a7ba5a0016e2cdcc9ba3ac91cf9fe00f00bd5726aba3b0d0cf3d155d357

      SHA512

      8e47a49f4b19b2ec36ea6897accaa10a2c331c59eecc8dcd56d45f16aca003ad8d544ec32f8694e8e6de68cad1a33194e9ff72f50b214fbc6294680604692920

    • \Users\Admin\AppData\Local\Temp\Resm1.exe
      MD5

      d8e14a9ccc62c5521cc0185e70a4b3ac

      SHA1

      dee2d62258264afe66e20434658b66bc8bbcc317

      SHA256

      2f481a7ba5a0016e2cdcc9ba3ac91cf9fe00f00bd5726aba3b0d0cf3d155d357

      SHA512

      8e47a49f4b19b2ec36ea6897accaa10a2c331c59eecc8dcd56d45f16aca003ad8d544ec32f8694e8e6de68cad1a33194e9ff72f50b214fbc6294680604692920

    • \Users\Admin\AppData\Local\Temp\Resm1.exe
      MD5

      d8e14a9ccc62c5521cc0185e70a4b3ac

      SHA1

      dee2d62258264afe66e20434658b66bc8bbcc317

      SHA256

      2f481a7ba5a0016e2cdcc9ba3ac91cf9fe00f00bd5726aba3b0d0cf3d155d357

      SHA512

      8e47a49f4b19b2ec36ea6897accaa10a2c331c59eecc8dcd56d45f16aca003ad8d544ec32f8694e8e6de68cad1a33194e9ff72f50b214fbc6294680604692920

    • \Users\Admin\AppData\Local\Temp\Resm1.exe
      MD5

      d8e14a9ccc62c5521cc0185e70a4b3ac

      SHA1

      dee2d62258264afe66e20434658b66bc8bbcc317

      SHA256

      2f481a7ba5a0016e2cdcc9ba3ac91cf9fe00f00bd5726aba3b0d0cf3d155d357

      SHA512

      8e47a49f4b19b2ec36ea6897accaa10a2c331c59eecc8dcd56d45f16aca003ad8d544ec32f8694e8e6de68cad1a33194e9ff72f50b214fbc6294680604692920

    • \Users\Admin\AppData\Local\Temp\Resm1.exe
      MD5

      d8e14a9ccc62c5521cc0185e70a4b3ac

      SHA1

      dee2d62258264afe66e20434658b66bc8bbcc317

      SHA256

      2f481a7ba5a0016e2cdcc9ba3ac91cf9fe00f00bd5726aba3b0d0cf3d155d357

      SHA512

      8e47a49f4b19b2ec36ea6897accaa10a2c331c59eecc8dcd56d45f16aca003ad8d544ec32f8694e8e6de68cad1a33194e9ff72f50b214fbc6294680604692920

    • \Users\Admin\AppData\Local\Temp\Resm1.exe
      MD5

      d8e14a9ccc62c5521cc0185e70a4b3ac

      SHA1

      dee2d62258264afe66e20434658b66bc8bbcc317

      SHA256

      2f481a7ba5a0016e2cdcc9ba3ac91cf9fe00f00bd5726aba3b0d0cf3d155d357

      SHA512

      8e47a49f4b19b2ec36ea6897accaa10a2c331c59eecc8dcd56d45f16aca003ad8d544ec32f8694e8e6de68cad1a33194e9ff72f50b214fbc6294680604692920

    • memory/520-95-0x00000000024C0000-0x00000000024C1000-memory.dmp
      Filesize

      4KB

    • memory/520-88-0x0000000003210000-0x0000000003211000-memory.dmp
      Filesize

      4KB

    • memory/520-113-0x00000000005C0000-0x00000000005C1000-memory.dmp
      Filesize

      4KB

    • memory/520-112-0x0000000002380000-0x0000000002381000-memory.dmp
      Filesize

      4KB

    • memory/520-111-0x00000000025D0000-0x00000000025D1000-memory.dmp
      Filesize

      4KB

    • memory/520-110-0x00000000005C0000-0x00000000005C1000-memory.dmp
      Filesize

      4KB

    • memory/520-109-0x00000000005C0000-0x00000000005C1000-memory.dmp
      Filesize

      4KB

    • memory/520-108-0x0000000002620000-0x0000000002621000-memory.dmp
      Filesize

      4KB

    • memory/520-114-0x00000000005C0000-0x00000000005C1000-memory.dmp
      Filesize

      4KB

    • memory/520-107-0x00000000025E0000-0x00000000025E1000-memory.dmp
      Filesize

      4KB

    • memory/520-106-0x0000000002630000-0x0000000002631000-memory.dmp
      Filesize

      4KB

    • memory/520-105-0x00000000025A0000-0x00000000025A1000-memory.dmp
      Filesize

      4KB

    • memory/520-104-0x0000000002610000-0x0000000002611000-memory.dmp
      Filesize

      4KB

    • memory/520-103-0x00000000025B0000-0x00000000025B1000-memory.dmp
      Filesize

      4KB

    • memory/520-102-0x00000000025C0000-0x00000000025C1000-memory.dmp
      Filesize

      4KB

    • memory/520-101-0x00000000005C0000-0x00000000005C1000-memory.dmp
      Filesize

      4KB

    • memory/520-100-0x0000000003210000-0x0000000003211000-memory.dmp
      Filesize

      4KB

    • memory/520-99-0x0000000003210000-0x0000000003211000-memory.dmp
      Filesize

      4KB

    • memory/520-98-0x0000000003210000-0x0000000003211000-memory.dmp
      Filesize

      4KB

    • memory/520-97-0x0000000003210000-0x0000000003211000-memory.dmp
      Filesize

      4KB

    • memory/520-96-0x0000000003210000-0x0000000003211000-memory.dmp
      Filesize

      4KB

    • memory/520-76-0x0000000002550000-0x0000000002551000-memory.dmp
      Filesize

      4KB

    • memory/520-93-0x00000000024D0000-0x00000000024D1000-memory.dmp
      Filesize

      4KB

    • memory/520-92-0x0000000002440000-0x0000000002441000-memory.dmp
      Filesize

      4KB

    • memory/520-91-0x00000000024B0000-0x00000000024B1000-memory.dmp
      Filesize

      4KB

    • memory/520-90-0x0000000002450000-0x0000000002451000-memory.dmp
      Filesize

      4KB

    • memory/520-89-0x0000000003210000-0x0000000003211000-memory.dmp
      Filesize

      4KB

    • memory/520-94-0x0000000002480000-0x0000000002481000-memory.dmp
      Filesize

      4KB

    • memory/520-87-0x0000000002360000-0x0000000002361000-memory.dmp
      Filesize

      4KB

    • memory/520-86-0x00000000005D0000-0x00000000005D1000-memory.dmp
      Filesize

      4KB

    • memory/520-85-0x0000000000650000-0x0000000000651000-memory.dmp
      Filesize

      4KB

    • memory/520-84-0x0000000002350000-0x0000000002351000-memory.dmp
      Filesize

      4KB

    • memory/520-83-0x00000000005E0000-0x00000000005E1000-memory.dmp
      Filesize

      4KB

    • memory/520-82-0x00000000005F0000-0x00000000005F1000-memory.dmp
      Filesize

      4KB

    • memory/520-81-0x0000000003210000-0x0000000003211000-memory.dmp
      Filesize

      4KB

    • memory/520-80-0x0000000003210000-0x0000000003211000-memory.dmp
      Filesize

      4KB

    • memory/520-79-0x0000000003210000-0x0000000003211000-memory.dmp
      Filesize

      4KB

    • memory/520-78-0x0000000003210000-0x0000000003211000-memory.dmp
      Filesize

      4KB

    • memory/520-77-0x0000000003220000-0x0000000003221000-memory.dmp
      Filesize

      4KB

    • memory/520-75-0x0000000002570000-0x0000000002571000-memory.dmp
      Filesize

      4KB

    • memory/520-74-0x0000000002530000-0x0000000002531000-memory.dmp
      Filesize

      4KB

    • memory/520-73-0x0000000002580000-0x0000000002581000-memory.dmp
      Filesize

      4KB

    • memory/520-72-0x00000000024F0000-0x00000000024F1000-memory.dmp
      Filesize

      4KB

    • memory/520-71-0x0000000002560000-0x0000000002561000-memory.dmp
      Filesize

      4KB

    • memory/520-70-0x0000000002500000-0x0000000002501000-memory.dmp
      Filesize

      4KB

    • memory/520-69-0x0000000002510000-0x0000000002511000-memory.dmp
      Filesize

      4KB

    • memory/520-68-0x0000000002460000-0x0000000002461000-memory.dmp
      Filesize

      4KB

    • memory/520-65-0x0000000000000000-mapping.dmp
    • memory/520-67-0x0000000000300000-0x0000000000360000-memory.dmp
      Filesize

      384KB

    • memory/628-118-0x0000000000400000-0x0000000000419000-memory.dmp
      Filesize

      100KB

    • memory/628-122-0x0000000000400000-0x0000000000419000-memory.dmp
      Filesize

      100KB

    • memory/628-119-0x0000000000410621-mapping.dmp
    • memory/1020-123-0x0000000000000000-mapping.dmp
    • memory/1860-59-0x0000000075B31000-0x0000000075B33000-memory.dmp
      Filesize

      8KB