Analysis

  • max time kernel
    63s
  • max time network
    89s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    03-07-2022 08:17

General

  • Target

    3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe

  • Size

    613KB

  • MD5

    3d354d274bea923b12e3950de7f51eea

  • SHA1

    3ca4aec7982bfbf10804685172974148dbca9d8b

  • SHA256

    3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2

  • SHA512

    083826b7348648de76f9112f347057ab2b99a466eb3b444d8a23074dc54882f9ef279513d33443afad51e9ccd51bc6d7cdcba2e9ec9ddb8beb68c6b5310e2cb9

Malware Config

Extracted

Family

pony

C2

http://al-hadin.com/pony/gate.php

Attributes
  • payload_url

    http://michmetals.info/bin/Myshit.exe

Extracted

Family

njrat

Version

0.7.3

Botnet

Exploited++

C2

salesxpert.duckdns.org:2889

Mutex

windows.exe

Attributes
  • reg_key

    windows.exe

  • splitter

    mnbvcxz12

Signatures

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe
    "C:\Users\Admin\AppData\Local\Temp\3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3124
    • C:\Users\Admin\AppData\Local\Temp\New Client.exe
      "C:\Users\Admin\AppData\Local\Temp\New Client.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_win_path
      PID:2356
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240585984.bat" "C:\Users\Admin\AppData\Local\Temp\New Client.exe" "
        3⤵
          PID:4992
      • C:\Users\Admin\AppData\Local\Temp\Client.exe
        "C:\Users\Admin\AppData\Local\Temp\Client.exe"
        2⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4260
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Delete /tn NYAN /F
          3⤵
            PID:2660
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 1
            3⤵
            • Creates scheduled task(s)
            PID:4416
          • C:\Users\Admin\windows.exe
            "C:\Users\Admin\windows.exe"
            3⤵
            • Executes dropped EXE
            • Drops startup file
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2116
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Delete /tn NYAN /F
              4⤵
                PID:3700
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn NYAN /tr "C:\Users\Admin\windows.exe" /sc minute /mo 1
                4⤵
                • Creates scheduled task(s)
                PID:4548
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Windows\win.vbs"
            2⤵
            • Adds Run key to start application
            PID:4536
          • C:\Users\Admin\AppData\Local\Temp\Windows\win.exe
            "C:\Users\Admin\AppData\Local\Temp\Windows\win.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4884
            • C:\Users\Admin\AppData\Local\Temp\Windows\win.exe
              C:\Users\Admin\AppData\Local\Temp\Windows\win.exe"
              3⤵
              • Executes dropped EXE
              PID:1344
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
          1⤵
            PID:3324

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Execution

          Scheduled Task

          1
          T1053

          Persistence

          Registry Run Keys / Startup Folder

          1
          T1060

          Scheduled Task

          1
          T1053

          Privilege Escalation

          Scheduled Task

          1
          T1053

          Defense Evasion

          Modify Registry

          1
          T1112

          Credential Access

          Credentials in Files

          2
          T1081

          Discovery

          Query Registry

          2
          T1012

          System Information Discovery

          2
          T1082

          Collection

          Data from Local System

          2
          T1005

          Email Collection

          2
          T1114

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\240585984.bat
            Filesize

            94B

            MD5

            3880eeb1c736d853eb13b44898b718ab

            SHA1

            4eec9d50360cd815211e3c4e6bdd08271b6ec8e6

            SHA256

            936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7

            SHA512

            3eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b

          • C:\Users\Admin\AppData\Local\Temp\Client.exe
            Filesize

            78KB

            MD5

            2c3dfd707a71a723aada2ab5cb4485d6

            SHA1

            41357a94ad63b2f6bbe4f4f0a069d6f22a125369

            SHA256

            1ba26b7fefc227463accb9d479889d17439b7de392d09722d271641acf24b23f

            SHA512

            fe6e219e3efb0c8e0ee3a77d5dc198a43df605e9859bf5a1b41dbd8cfae929d9c684025676b80c8f5438e3e4de1d1b9a0a78bf5c5fd2005763e8d254425dcb19

          • C:\Users\Admin\AppData\Local\Temp\Client.exe
            Filesize

            78KB

            MD5

            2c3dfd707a71a723aada2ab5cb4485d6

            SHA1

            41357a94ad63b2f6bbe4f4f0a069d6f22a125369

            SHA256

            1ba26b7fefc227463accb9d479889d17439b7de392d09722d271641acf24b23f

            SHA512

            fe6e219e3efb0c8e0ee3a77d5dc198a43df605e9859bf5a1b41dbd8cfae929d9c684025676b80c8f5438e3e4de1d1b9a0a78bf5c5fd2005763e8d254425dcb19

          • C:\Users\Admin\AppData\Local\Temp\New Client.exe
            Filesize

            90KB

            MD5

            d076584bcfa0eb1f4fdeea8e37b6691d

            SHA1

            3abbecac5296f063ee4dfb7c1726a4521d4ac7c2

            SHA256

            dc2f431a1b1f587a7eacb58d1d86c7ec8183f38c5c86a8b2465dd3dcf4eab995

            SHA512

            1141b4d97a7dc461b5b44a9478eb2c503c35a49d124127848c901cf1e9e1fd65dcdd6f8f10bccf465bdbc708945707acdb6915631d518afee29d10c696419709

          • C:\Users\Admin\AppData\Local\Temp\New Client.exe
            Filesize

            90KB

            MD5

            d076584bcfa0eb1f4fdeea8e37b6691d

            SHA1

            3abbecac5296f063ee4dfb7c1726a4521d4ac7c2

            SHA256

            dc2f431a1b1f587a7eacb58d1d86c7ec8183f38c5c86a8b2465dd3dcf4eab995

            SHA512

            1141b4d97a7dc461b5b44a9478eb2c503c35a49d124127848c901cf1e9e1fd65dcdd6f8f10bccf465bdbc708945707acdb6915631d518afee29d10c696419709

          • C:\Users\Admin\AppData\Local\Temp\Windows\win.exe
            Filesize

            613KB

            MD5

            3d354d274bea923b12e3950de7f51eea

            SHA1

            3ca4aec7982bfbf10804685172974148dbca9d8b

            SHA256

            3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2

            SHA512

            083826b7348648de76f9112f347057ab2b99a466eb3b444d8a23074dc54882f9ef279513d33443afad51e9ccd51bc6d7cdcba2e9ec9ddb8beb68c6b5310e2cb9

          • C:\Users\Admin\AppData\Local\Temp\Windows\win.exe
            Filesize

            613KB

            MD5

            3d354d274bea923b12e3950de7f51eea

            SHA1

            3ca4aec7982bfbf10804685172974148dbca9d8b

            SHA256

            3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2

            SHA512

            083826b7348648de76f9112f347057ab2b99a466eb3b444d8a23074dc54882f9ef279513d33443afad51e9ccd51bc6d7cdcba2e9ec9ddb8beb68c6b5310e2cb9

          • C:\Users\Admin\AppData\Local\Temp\Windows\win.exe
            Filesize

            613KB

            MD5

            3d354d274bea923b12e3950de7f51eea

            SHA1

            3ca4aec7982bfbf10804685172974148dbca9d8b

            SHA256

            3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2

            SHA512

            083826b7348648de76f9112f347057ab2b99a466eb3b444d8a23074dc54882f9ef279513d33443afad51e9ccd51bc6d7cdcba2e9ec9ddb8beb68c6b5310e2cb9

          • C:\Users\Admin\AppData\Local\Temp\Windows\win.vbs
            Filesize

            1024B

            MD5

            eb097395c2d5c72a860d6b532f2b7a8b

            SHA1

            c8cb654b617a6bda92c83954b5398eb15f2a4bc3

            SHA256

            72e3fa13c50dea06cf0fcb050b6f3de9d82822d12894aa73365290fa6215894a

            SHA512

            7670c37180c532342ef5ec0f1697e2d2a5002e515b60fabb395eaf960b168c4be6652b771641f6457bd826e807d1c39302948233a51ebc0414ea806548f3fd5b

          • C:\Users\Admin\windows.exe
            Filesize

            78KB

            MD5

            2c3dfd707a71a723aada2ab5cb4485d6

            SHA1

            41357a94ad63b2f6bbe4f4f0a069d6f22a125369

            SHA256

            1ba26b7fefc227463accb9d479889d17439b7de392d09722d271641acf24b23f

            SHA512

            fe6e219e3efb0c8e0ee3a77d5dc198a43df605e9859bf5a1b41dbd8cfae929d9c684025676b80c8f5438e3e4de1d1b9a0a78bf5c5fd2005763e8d254425dcb19

          • C:\Users\Admin\windows.exe
            Filesize

            78KB

            MD5

            2c3dfd707a71a723aada2ab5cb4485d6

            SHA1

            41357a94ad63b2f6bbe4f4f0a069d6f22a125369

            SHA256

            1ba26b7fefc227463accb9d479889d17439b7de392d09722d271641acf24b23f

            SHA512

            fe6e219e3efb0c8e0ee3a77d5dc198a43df605e9859bf5a1b41dbd8cfae929d9c684025676b80c8f5438e3e4de1d1b9a0a78bf5c5fd2005763e8d254425dcb19

          • memory/1344-186-0x0000000000000000-mapping.dmp
          • memory/2116-179-0x0000000006DD7000-0x0000000006DDC000-memory.dmp
            Filesize

            20KB

          • memory/2116-180-0x0000000006DD1000-0x0000000006DD6000-memory.dmp
            Filesize

            20KB

          • memory/2116-195-0x0000000006DD4000-0x0000000006DD7000-memory.dmp
            Filesize

            12KB

          • memory/2116-176-0x0000000001689000-0x000000000168F000-memory.dmp
            Filesize

            24KB

          • memory/2116-194-0x0000000006DD0000-0x0000000006DD4000-memory.dmp
            Filesize

            16KB

          • memory/2116-193-0x0000000001689000-0x000000000168F000-memory.dmp
            Filesize

            24KB

          • memory/2116-192-0x0000000006DDC000-0x0000000006DE1000-memory.dmp
            Filesize

            20KB

          • memory/2116-191-0x00000000735D0000-0x0000000073B81000-memory.dmp
            Filesize

            5.7MB

          • memory/2116-189-0x0000000006DD1000-0x0000000006DD6000-memory.dmp
            Filesize

            20KB

          • memory/2116-190-0x0000000001685000-0x000000000168E000-memory.dmp
            Filesize

            36KB

          • memory/2116-178-0x0000000006DD4000-0x0000000006DD7000-memory.dmp
            Filesize

            12KB

          • memory/2116-177-0x0000000006DD0000-0x0000000006DD4000-memory.dmp
            Filesize

            16KB

          • memory/2116-184-0x0000000006DD1000-0x0000000006DD6000-memory.dmp
            Filesize

            20KB

          • memory/2116-175-0x00000000735D0000-0x0000000073B81000-memory.dmp
            Filesize

            5.7MB

          • memory/2116-185-0x0000000001686000-0x000000000168E000-memory.dmp
            Filesize

            32KB

          • memory/2116-182-0x0000000001685000-0x0000000001688000-memory.dmp
            Filesize

            12KB

          • memory/2116-183-0x0000000001688000-0x000000000168E000-memory.dmp
            Filesize

            24KB

          • memory/2116-163-0x0000000000000000-mapping.dmp
          • memory/2116-181-0x0000000001687000-0x000000000168E000-memory.dmp
            Filesize

            28KB

          • memory/2356-134-0x0000000000000000-mapping.dmp
          • memory/2660-149-0x0000000000000000-mapping.dmp
          • memory/3124-146-0x0000000077B80000-0x0000000077D23000-memory.dmp
            Filesize

            1.6MB

          • memory/3124-132-0x0000000002250000-0x0000000002258000-memory.dmp
            Filesize

            32KB

          • memory/3124-133-0x0000000077B80000-0x0000000077D23000-memory.dmp
            Filesize

            1.6MB

          • memory/3700-167-0x0000000000000000-mapping.dmp
          • memory/4260-159-0x0000000006EA1000-0x0000000006EA6000-memory.dmp
            Filesize

            20KB

          • memory/4260-160-0x0000000001AB6000-0x0000000001ABE000-memory.dmp
            Filesize

            32KB

          • memory/4260-173-0x0000000001AB9000-0x0000000001ABF000-memory.dmp
            Filesize

            24KB

          • memory/4260-174-0x0000000001AB5000-0x0000000001AB9000-memory.dmp
            Filesize

            16KB

          • memory/4260-148-0x00000000735D0000-0x0000000073B81000-memory.dmp
            Filesize

            5.7MB

          • memory/4260-170-0x0000000006EA4000-0x0000000006EA7000-memory.dmp
            Filesize

            12KB

          • memory/4260-169-0x0000000006EA0000-0x0000000006EA4000-memory.dmp
            Filesize

            16KB

          • memory/4260-168-0x0000000001AB6000-0x0000000001ABE000-memory.dmp
            Filesize

            32KB

          • memory/4260-166-0x00000000735D0000-0x0000000073B81000-memory.dmp
            Filesize

            5.7MB

          • memory/4260-137-0x0000000000000000-mapping.dmp
          • memory/4260-153-0x0000000001AB9000-0x0000000001ABF000-memory.dmp
            Filesize

            24KB

          • memory/4260-162-0x0000000006EA1000-0x0000000006EA6000-memory.dmp
            Filesize

            20KB

          • memory/4260-161-0x0000000001AB5000-0x0000000001AB9000-memory.dmp
            Filesize

            16KB

          • memory/4260-172-0x0000000006EA7000-0x0000000006EAC000-memory.dmp
            Filesize

            20KB

          • memory/4260-158-0x0000000001AB6000-0x0000000001ABE000-memory.dmp
            Filesize

            32KB

          • memory/4260-156-0x0000000006EA7000-0x0000000006EAC000-memory.dmp
            Filesize

            20KB

          • memory/4260-157-0x0000000006EA1000-0x0000000006EA6000-memory.dmp
            Filesize

            20KB

          • memory/4260-154-0x0000000006EA0000-0x0000000006EA4000-memory.dmp
            Filesize

            16KB

          • memory/4260-155-0x0000000006EA4000-0x0000000006EA7000-memory.dmp
            Filesize

            12KB

          • memory/4416-150-0x0000000000000000-mapping.dmp
          • memory/4536-140-0x0000000000000000-mapping.dmp
          • memory/4548-171-0x0000000000000000-mapping.dmp
          • memory/4884-188-0x0000000077B80000-0x0000000077D23000-memory.dmp
            Filesize

            1.6MB

          • memory/4884-142-0x0000000000000000-mapping.dmp
          • memory/4992-151-0x0000000000000000-mapping.dmp