Resubmissions

13-01-2022 13:19

220113-qkhx6sade2 4

12-09-2021 07:40

210912-jhysaacbd3 10

12-09-2021 07:40

210912-jhp55sfbbr 10

12-09-2021 07:39

210912-jhc6kscbd2 10

12-09-2021 07:39

210912-jg161sfbbp 10

12-09-2021 07:38

210912-jgmnmafbbn 10

Analysis

  • max time kernel
    2512s
  • max time network
    2529s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    12-09-2021 07:39

General

  • Target

    Dot.Tk.123.ticket.keygen.by.CORE.bin.exe

  • Size

    6.2MB

  • MD5

    0cb3efeb5d9312e068c57e7e55affed7

  • SHA1

    aad1c65d257c7d2929ffb916114bc532feba0a16

  • SHA256

    a974231d8889e05fedfbe73b5cc58e414de6fd5031765c998a24ac326f35b0b2

  • SHA512

    236ce9aa9e71f279e7833c4f0afbad15a2de4aaf62e78a82f1132224951f25f0a184aacfe5c963a20481c20cdb12e1a56e6aaf662f4a07c756abe0c539488898

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Extracted

Family

pony

C2

http://www.oldhorse.info

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Executes dropped EXE 9 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dot.Tk.123.ticket.keygen.by.CORE.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\Dot.Tk.123.ticket.keygen.by.CORE.bin.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1436
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
        keygen-pr.exe -p83fsase3Ge
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3704
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4484
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
            C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat
            5⤵
            • Executes dropped EXE
            PID:4644
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
        keygen-step-1.exe
        3⤵
        • Executes dropped EXE
        PID:2652
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-6.exe
        keygen-step-6.exe
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:2348
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-6.exe" >> NUL
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:676
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1
            5⤵
            • Runs ping.exe
            PID:4708
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
        keygen-step-3.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:2272
        • C:\Windows\winnetdriv.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe" 1631432408 0
          4⤵
          • Executes dropped EXE
          PID:4408
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
        keygen-step-4.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4224
        • C:\Users\Admin\AppData\Local\Temp\RarSFX2\KiffAppE2.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX2\KiffAppE2.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:4548

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2272-129-0x0000000000400000-0x00000000004E5000-memory.dmp

    Filesize

    916KB

  • memory/2348-130-0x0000000000A00000-0x0000000000A18000-memory.dmp

    Filesize

    96KB

  • memory/4408-145-0x0000000000900000-0x00000000009E5000-memory.dmp

    Filesize

    916KB

  • memory/4484-167-0x0000000002D80000-0x0000000002E6F000-memory.dmp

    Filesize

    956KB

  • memory/4484-168-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

    Filesize

    4KB

  • memory/4484-160-0x00000000024F0000-0x000000000268C000-memory.dmp

    Filesize

    1.6MB

  • memory/4484-169-0x0000000000BD0000-0x0000000000BEB000-memory.dmp

    Filesize

    108KB

  • memory/4548-158-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/4548-164-0x000000001B730000-0x000000001B732000-memory.dmp

    Filesize

    8KB

  • memory/4548-170-0x000000001B732000-0x000000001B734000-memory.dmp

    Filesize

    8KB

  • memory/4548-171-0x000000001B735000-0x000000001B737000-memory.dmp

    Filesize

    8KB

  • memory/4644-161-0x0000000000400000-0x0000000000983000-memory.dmp

    Filesize

    5.5MB

  • memory/4644-165-0x0000000000400000-0x0000000000983000-memory.dmp

    Filesize

    5.5MB