Analysis

  • max time kernel
    153s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    14-05-2022 13:50

General

  • Target

    b9abb9034a6e25c416c3031b9dbfd566b3d7b39dfb1fc9229095f22ee8c6a9bf.exe

  • Size

    790KB

  • MD5

    c767466a3e546cf4c3f4c7d06674f649

  • SHA1

    86fd75f689e1cdae1ebe04e75cb8c41007d58f8a

  • SHA256

    b9abb9034a6e25c416c3031b9dbfd566b3d7b39dfb1fc9229095f22ee8c6a9bf

  • SHA512

    455df92cf93a0d78022275230f095c8ff502bfb046b407262c0043159d198294c95c32821b284f72e868983d62077e9a8a99ded02f5c4d18ef40ee2e97c9ea06

Malware Config

Extracted

Family

pony

C2

http://serniorduncan30.host56.com/html/gate.php

Signatures

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Sets file to hidden 1 TTPs

    Modifies file attributes to stop it showing in Explorer etc.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 34 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9abb9034a6e25c416c3031b9dbfd566b3d7b39dfb1fc9229095f22ee8c6a9bf.exe
    "C:\Users\Admin\AppData\Local\Temp\b9abb9034a6e25c416c3031b9dbfd566b3d7b39dfb1fc9229095f22ee8c6a9bf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\SysWOW64\attrib.exe
      "C:\Windows\System32\attrib.exe" +s +h C:\Users\Admin\AppData\Local\Temp\b9abb9034a6e25c416c3031b9dbfd566b3d7b39dfb1fc9229095f22ee8c6a9bf.exe
      2⤵
      • Views/modifies file attributes
      PID:1664
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "rsegdgsg" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\\ergsergs\dev.exe
      2⤵
      • Adds Run key to start application
      PID:1712
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:900
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "rsegdgsg" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\\ergsergs\dev.exe
      2⤵
      • Adds Run key to start application
      PID:1892
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "rsegdgsg" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\\ergsergs\dev.exe
      2⤵
      • Adds Run key to start application
      PID:1788
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "rsegdgsg" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\\ergsergs\dev.exe
      2⤵
      • Adds Run key to start application
      PID:1564
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "rsegdgsg" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\\ergsergs\dev.exe
      2⤵
      • Adds Run key to start application
      PID:1808
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "rsegdgsg" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\\ergsergs\dev.exe
      2⤵
      • Adds Run key to start application
      PID:1372
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "rsegdgsg" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\\ergsergs\dev.exe
      2⤵
      • Adds Run key to start application
      PID:1656
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "rsegdgsg" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\\ergsergs\dev.exe
      2⤵
      • Adds Run key to start application
      PID:1452
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "rsegdgsg" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\\ergsergs\dev.exe
      2⤵
      • Adds Run key to start application
      PID:780
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "rsegdgsg" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\\ergsergs\dev.exe
      2⤵
      • Adds Run key to start application
      PID:844
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "rsegdgsg" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\\ergsergs\dev.exe
      2⤵
      • Adds Run key to start application
      PID:1544
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "rsegdgsg" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\\ergsergs\dev.exe
      2⤵
      • Adds Run key to start application
      PID:304
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "rsegdgsg" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\\ergsergs\dev.exe
      2⤵
      • Adds Run key to start application
      PID:1992
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "rsegdgsg" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\\ergsergs\dev.exe
      2⤵
      • Adds Run key to start application
      PID:580
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "rsegdgsg" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\\ergsergs\dev.exe
      2⤵
      • Adds Run key to start application
      PID:1588
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "rsegdgsg" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\\ergsergs\dev.exe
      2⤵
      • Adds Run key to start application
      PID:1540
    • C:\Windows\SysWOW64\REG.exe
      REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "rsegdgsg" /t REG_SZ /F /D "C:\Users\Admin\AppData\Local\Temp\\ergsergs\dev.exe
      2⤵
      • Adds Run key to start application
      PID:676

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/304-82-0x0000000000000000-mapping.dmp

  • memory/580-84-0x0000000000000000-mapping.dmp

  • memory/676-87-0x0000000000000000-mapping.dmp

  • memory/780-79-0x0000000000000000-mapping.dmp

  • memory/844-80-0x0000000000000000-mapping.dmp

  • memory/900-62-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/900-58-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/900-78-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/900-64-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/900-65-0x000000000040FF04-mapping.dmp

  • memory/900-67-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/900-76-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/900-61-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/900-59-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/1372-73-0x0000000000000000-mapping.dmp

  • memory/1452-77-0x0000000000000000-mapping.dmp

  • memory/1540-86-0x0000000000000000-mapping.dmp

  • memory/1544-81-0x0000000000000000-mapping.dmp

  • memory/1564-71-0x0000000000000000-mapping.dmp

  • memory/1588-85-0x0000000000000000-mapping.dmp

  • memory/1656-74-0x0000000000000000-mapping.dmp

  • memory/1664-56-0x0000000000000000-mapping.dmp

  • memory/1712-57-0x0000000000000000-mapping.dmp

  • memory/1728-54-0x0000000076171000-0x0000000076173000-memory.dmp

    Filesize

    8KB

  • memory/1728-55-0x0000000074860000-0x0000000074E0B000-memory.dmp

    Filesize

    5.7MB

  • memory/1788-69-0x0000000000000000-mapping.dmp

  • memory/1808-72-0x0000000000000000-mapping.dmp

  • memory/1892-68-0x0000000000000000-mapping.dmp

  • memory/1992-83-0x0000000000000000-mapping.dmp