Overview
overview
10Static
static
101.exe
windows7_x64
61.exe
windows10-2004_x64
610.exe
windows7_x64
1010.exe
windows10-2004_x64
102.doc
windows7_x64
102.doc
windows10-2004_x64
13.xlsx
windows7_x64
103.xlsx
windows10-2004_x64
14.exe
windows7_x64
104.exe
windows10-2004_x64
15.exe
windows7_x64
105.exe
windows10-2004_x64
16.exe
windows7_x64
106.exe
windows10-2004_x64
107.exe
windows7_x64
107.exe
windows10-2004_x64
18.exe
windows7_x64
108.exe
windows10-2004_x64
109.docm
windows7_x64
109.docm
windows10-2004_x64
10rip.bat
windows7_x64
10rip.bat
windows10-2004_x64
10Analysis
-
max time kernel
4294183s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
23-03-2022 21:00
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
10.exe
Resource
win7-20220310-en
Behavioral task
behavioral4
Sample
10.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
2.doc
Resource
win7-20220311-en
Behavioral task
behavioral6
Sample
2.doc
Resource
win10v2004-20220310-en
Behavioral task
behavioral7
Sample
3.xlsx
Resource
win7-20220311-en
Behavioral task
behavioral8
Sample
3.xlsx
Resource
win10v2004-20220310-en
Behavioral task
behavioral9
Sample
4.exe
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
4.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral11
Sample
5.exe
Resource
win7-20220310-en
Behavioral task
behavioral12
Sample
5.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral13
Sample
6.exe
Resource
win7-20220310-en
Behavioral task
behavioral14
Sample
6.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral15
Sample
7.exe
Resource
win7-20220311-en
Behavioral task
behavioral16
Sample
7.exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral17
Sample
8.exe
Resource
win7-20220311-en
Behavioral task
behavioral18
Sample
8.exe
Resource
win10v2004-20220310-en
Behavioral task
behavioral19
Sample
9.docm
Resource
win7-20220311-en
Behavioral task
behavioral20
Sample
9.docm
Resource
win10v2004-en-20220113
Behavioral task
behavioral21
Sample
rip.bat
Resource
win7-20220310-en
Behavioral task
behavioral22
Sample
rip.bat
Resource
win10v2004-en-20220113
Malware Config
Extracted
pony
http://londonpaerl.co.uk/yesup/gate.php
Signatures
-
Processes:
resource yara_rule behavioral9/memory/572-59-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral9/memory/572-60-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral9/memory/572-57-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral9/memory/572-63-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral9/memory/572-65-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral9/memory/572-64-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1844 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
4.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 4.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
4.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
4.exedescription pid process target process PID 2020 set thread context of 572 2020 4.exe 4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
4.exe4.exedescription pid process Token: SeDebugPrivilege 2020 4.exe Token: SeImpersonatePrivilege 572 4.exe Token: SeTcbPrivilege 572 4.exe Token: SeChangeNotifyPrivilege 572 4.exe Token: SeCreateTokenPrivilege 572 4.exe Token: SeBackupPrivilege 572 4.exe Token: SeRestorePrivilege 572 4.exe Token: SeIncreaseQuotaPrivilege 572 4.exe Token: SeAssignPrimaryTokenPrivilege 572 4.exe Token: SeImpersonatePrivilege 572 4.exe Token: SeTcbPrivilege 572 4.exe Token: SeChangeNotifyPrivilege 572 4.exe Token: SeCreateTokenPrivilege 572 4.exe Token: SeBackupPrivilege 572 4.exe Token: SeRestorePrivilege 572 4.exe Token: SeIncreaseQuotaPrivilege 572 4.exe Token: SeAssignPrimaryTokenPrivilege 572 4.exe Token: SeImpersonatePrivilege 572 4.exe Token: SeTcbPrivilege 572 4.exe Token: SeChangeNotifyPrivilege 572 4.exe Token: SeCreateTokenPrivilege 572 4.exe Token: SeBackupPrivilege 572 4.exe Token: SeRestorePrivilege 572 4.exe Token: SeIncreaseQuotaPrivilege 572 4.exe Token: SeAssignPrimaryTokenPrivilege 572 4.exe Token: SeImpersonatePrivilege 572 4.exe Token: SeTcbPrivilege 572 4.exe Token: SeChangeNotifyPrivilege 572 4.exe Token: SeCreateTokenPrivilege 572 4.exe Token: SeBackupPrivilege 572 4.exe Token: SeRestorePrivilege 572 4.exe Token: SeIncreaseQuotaPrivilege 572 4.exe Token: SeAssignPrimaryTokenPrivilege 572 4.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4.exe4.exedescription pid process target process PID 2020 wrote to memory of 572 2020 4.exe 4.exe PID 2020 wrote to memory of 572 2020 4.exe 4.exe PID 2020 wrote to memory of 572 2020 4.exe 4.exe PID 2020 wrote to memory of 572 2020 4.exe 4.exe PID 2020 wrote to memory of 572 2020 4.exe 4.exe PID 2020 wrote to memory of 572 2020 4.exe 4.exe PID 2020 wrote to memory of 572 2020 4.exe 4.exe PID 2020 wrote to memory of 572 2020 4.exe 4.exe PID 572 wrote to memory of 1844 572 4.exe cmd.exe PID 572 wrote to memory of 1844 572 4.exe cmd.exe PID 572 wrote to memory of 1844 572 4.exe cmd.exe PID 572 wrote to memory of 1844 572 4.exe cmd.exe -
outlook_win_path 1 IoCs
Processes:
4.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"2⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:572 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259437010.bat" "C:\Users\Admin\AppData\Local\Temp\4.exe" "3⤵
- Deletes itself
PID:1844
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94B
MD53880eeb1c736d853eb13b44898b718ab
SHA14eec9d50360cd815211e3c4e6bdd08271b6ec8e6
SHA256936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7
SHA5123eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b