Analysis

  • max time kernel
    154s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    01-02-2022 02:30

General

  • Target

    fa8e5817b7a1e2a8129b1c6df41ccc378b6e44372de4c27edba38d6a9d1d40d1.exe

  • Size

    276KB

  • MD5

    01de124cfce46ee08b17cee79487f63a

  • SHA1

    2c560ff85da953d326c99d26b4688c4553dcb37a

  • SHA256

    fa8e5817b7a1e2a8129b1c6df41ccc378b6e44372de4c27edba38d6a9d1d40d1

  • SHA512

    4952ce41f1cce73685c182c7f41ec7b01d6cd6e223f1ee27115c222a2d5081f5eee3395f9aba540aacdbf4365ede54e8928281d840f5e0ed18f36b911d054592

Malware Config

Extracted

Family

pony

C2

http://kingusaref.com/mlu/forum.php

http://retnejustren.ru/mlu/forum.php

http://tansinmaked.ru/mlu/forum.php

Attributes
  • payload_url

    http://cid.ag/wp-admin/art.exe

Signatures

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa8e5817b7a1e2a8129b1c6df41ccc378b6e44372de4c27edba38d6a9d1d40d1.exe
    "C:\Users\Admin\AppData\Local\Temp\fa8e5817b7a1e2a8129b1c6df41ccc378b6e44372de4c27edba38d6a9d1d40d1.exe"
    1⤵
    • Accesses Microsoft Outlook accounts
    • Accesses Microsoft Outlook profiles
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:828
    • C:\Windows\SysWOW64\cmd.exe
      cmd /K
      2⤵
        PID:524

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Email Collection

    2
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/828-55-0x0000000000290000-0x00000000002C9000-memory.dmp
      Filesize

      228KB

    • memory/828-56-0x0000000075D61000-0x0000000075D63000-memory.dmp
      Filesize

      8KB

    • memory/828-57-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB