Overview
overview
10Static
static
10files/1.exe
windows7-x64
1files/1.exe
windows10-2004-x64
1files/10.exe
windows7-x64
7files/10.exe
windows10-2004-x64
7files/11.exe
windows7-x64
10files/11.exe
windows10-2004-x64
10files/12.exe
windows7-x64
8files/12.exe
windows10-2004-x64
8files/13.exe
windows7-x64
10files/13.exe
windows10-2004-x64
10files/14.exe
windows7-x64
10files/14.exe
windows10-2004-x64
10files/15.exe
windows7-x64
10files/15.exe
windows10-2004-x64
10files/2.exe
windows7-x64
10files/2.exe
windows10-2004-x64
10files/3.exe
windows7-x64
10files/3.exe
windows10-2004-x64
10files/4.exe
windows7-x64
10files/4.exe
windows10-2004-x64
10files/5.exe
windows7-x64
10files/5.exe
windows10-2004-x64
10files/6.exe
windows7-x64
6files/6.exe
windows10-2004-x64
6files/7.exe
windows7-x64
10files/7.exe
windows10-2004-x64
10files/8.exe
windows7-x64
10files/8.exe
windows10-2004-x64
10files/9.exe
windows7-x64
10files/9.exe
windows10-2004-x64
10Analysis
-
max time kernel
100s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 05:57
Behavioral task
behavioral1
Sample
files/1.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
files/1.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral3
Sample
files/10.exe
Resource
win7-20220715-en
Behavioral task
behavioral4
Sample
files/10.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral5
Sample
files/11.exe
Resource
win7-20220715-en
Behavioral task
behavioral6
Sample
files/11.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral7
Sample
files/12.exe
Resource
win7-20220715-en
Behavioral task
behavioral8
Sample
files/12.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral9
Sample
files/13.exe
Resource
win7-20220715-en
Behavioral task
behavioral10
Sample
files/13.exe
Resource
win10v2004-20220722-en
Behavioral task
behavioral11
Sample
files/14.exe
Resource
win7-20220715-en
Behavioral task
behavioral12
Sample
files/14.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral13
Sample
files/15.exe
Resource
win7-20220715-en
Behavioral task
behavioral14
Sample
files/15.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral15
Sample
files/2.exe
Resource
win7-20220718-en
Behavioral task
behavioral16
Sample
files/2.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral17
Sample
files/3.exe
Resource
win7-20220715-en
Behavioral task
behavioral18
Sample
files/3.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral19
Sample
files/4.exe
Resource
win7-20220718-en
Behavioral task
behavioral20
Sample
files/4.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral21
Sample
files/5.exe
Resource
win7-20220718-en
Behavioral task
behavioral22
Sample
files/5.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral23
Sample
files/6.exe
Resource
win7-20220715-en
Behavioral task
behavioral24
Sample
files/6.exe
Resource
win10v2004-20220722-en
Behavioral task
behavioral25
Sample
files/7.exe
Resource
win7-20220718-en
Behavioral task
behavioral26
Sample
files/7.exe
Resource
win10v2004-20220722-en
Behavioral task
behavioral27
Sample
files/8.exe
Resource
win7-20220718-en
Behavioral task
behavioral28
Sample
files/8.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral29
Sample
files/9.exe
Resource
win7-20220718-en
General
-
Target
files/4.exe
-
Size
13.3MB
-
MD5
3506d61924caf464f2504d3e330ba11e
-
SHA1
4472cc23b5e7860a8fd5d371152ab92c263273f4
-
SHA256
8810286390803f16cf848691b51bfc92b21ace6a537503a86bc3ed497d579f2c
-
SHA512
cf9009cf2a56b7d611f268c3931e85ac99b3a22e3461d1bb492e114cd198d108f9e269f4a12b2cb03985ebf6a7dbe404334176e1530e7282b653b82ca586634f
Malware Config
Extracted
pony
http://mepsb-com.me/solisoft/coreserver/gate.php
-
payload_url
http://mepsb-com.me/solisoft/coreserver/shit.exe
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1812 filename.scr 1472 filename.scr -
Loads dropped DLL 3 IoCs
pid Process 1700 WScript.exe 1700 WScript.exe 1812 filename.scr -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts filename.scr -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook filename.scr -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\subfolder = "C:\\Users\\Admin\\AppData\\Local\\Temp\\subfolder\\filename.vbs" WScript.exe Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeImpersonatePrivilege 1472 filename.scr Token: SeTcbPrivilege 1472 filename.scr Token: SeChangeNotifyPrivilege 1472 filename.scr Token: SeCreateTokenPrivilege 1472 filename.scr Token: SeBackupPrivilege 1472 filename.scr Token: SeRestorePrivilege 1472 filename.scr Token: SeIncreaseQuotaPrivilege 1472 filename.scr Token: SeAssignPrimaryTokenPrivilege 1472 filename.scr Token: SeImpersonatePrivilege 1472 filename.scr Token: SeTcbPrivilege 1472 filename.scr Token: SeChangeNotifyPrivilege 1472 filename.scr Token: SeCreateTokenPrivilege 1472 filename.scr Token: SeBackupPrivilege 1472 filename.scr Token: SeRestorePrivilege 1472 filename.scr Token: SeIncreaseQuotaPrivilege 1472 filename.scr Token: SeAssignPrimaryTokenPrivilege 1472 filename.scr Token: SeImpersonatePrivilege 1472 filename.scr Token: SeTcbPrivilege 1472 filename.scr Token: SeChangeNotifyPrivilege 1472 filename.scr Token: SeCreateTokenPrivilege 1472 filename.scr Token: SeBackupPrivilege 1472 filename.scr Token: SeRestorePrivilege 1472 filename.scr Token: SeIncreaseQuotaPrivilege 1472 filename.scr Token: SeAssignPrimaryTokenPrivilege 1472 filename.scr Token: SeImpersonatePrivilege 1472 filename.scr Token: SeTcbPrivilege 1472 filename.scr Token: SeChangeNotifyPrivilege 1472 filename.scr Token: SeCreateTokenPrivilege 1472 filename.scr Token: SeBackupPrivilege 1472 filename.scr Token: SeRestorePrivilege 1472 filename.scr Token: SeIncreaseQuotaPrivilege 1472 filename.scr Token: SeAssignPrimaryTokenPrivilege 1472 filename.scr -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1492 4.exe 1812 filename.scr -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1700 1492 4.exe 27 PID 1492 wrote to memory of 1700 1492 4.exe 27 PID 1492 wrote to memory of 1700 1492 4.exe 27 PID 1492 wrote to memory of 1700 1492 4.exe 27 PID 1700 wrote to memory of 1812 1700 WScript.exe 28 PID 1700 wrote to memory of 1812 1700 WScript.exe 28 PID 1700 wrote to memory of 1812 1700 WScript.exe 28 PID 1700 wrote to memory of 1812 1700 WScript.exe 28 PID 1812 wrote to memory of 1472 1812 filename.scr 29 PID 1812 wrote to memory of 1472 1812 filename.scr 29 PID 1812 wrote to memory of 1472 1812 filename.scr 29 PID 1812 wrote to memory of 1472 1812 filename.scr 29 PID 1812 wrote to memory of 1472 1812 filename.scr 29 PID 1812 wrote to memory of 1472 1812 filename.scr 29 PID 1812 wrote to memory of 1472 1812 filename.scr 29 PID 1812 wrote to memory of 1472 1812 filename.scr 29 PID 1812 wrote to memory of 1472 1812 filename.scr 29 PID 1812 wrote to memory of 1472 1812 filename.scr 29 PID 1812 wrote to memory of 1472 1812 filename.scr 29 PID 1812 wrote to memory of 1472 1812 filename.scr 29 PID 1812 wrote to memory of 1472 1812 filename.scr 29 PID 1812 wrote to memory of 1472 1812 filename.scr 29 PID 1812 wrote to memory of 1472 1812 filename.scr 29 PID 1472 wrote to memory of 1568 1472 filename.scr 31 PID 1472 wrote to memory of 1568 1472 filename.scr 31 PID 1472 wrote to memory of 1568 1472 filename.scr 31 PID 1472 wrote to memory of 1568 1472 filename.scr 31 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook filename.scr
Processes
-
C:\Users\Admin\AppData\Local\Temp\files\4.exe"C:\Users\Admin\AppData\Local\Temp\files\4.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\subfolder\filename.vbs"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\subfolder\filename.scr"C:\Users\Admin\AppData\Local\Temp\subfolder\filename.scr" /S3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\subfolder\filename.scr"C:\Users\Admin\AppData\Local\Temp\subfolder\filename.scr" /S4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:1472 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7186607.bat" "C:\Users\Admin\AppData\Local\Temp\subfolder\filename.scr" "5⤵PID:1568
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94B
MD53880eeb1c736d853eb13b44898b718ab
SHA14eec9d50360cd815211e3c4e6bdd08271b6ec8e6
SHA256936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7
SHA5123eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b
-
Filesize
13.3MB
MD5e615354d620941db592d304f53cbaddd
SHA1a89cd49f4f00b10afea77f44f73071a931858ae6
SHA2567445f20a8ab4450280b2baca433ccf6bd28763701686822f0595209850f1a94a
SHA512554fd2161d85751e680ec02ff81718df22ff5ea41ea78a461a1d63497cab9701f8a27aeb3383b68a243832b55f699c44337dbfd8c8a025ff096779dd5347ce73
-
Filesize
13.3MB
MD5e615354d620941db592d304f53cbaddd
SHA1a89cd49f4f00b10afea77f44f73071a931858ae6
SHA2567445f20a8ab4450280b2baca433ccf6bd28763701686822f0595209850f1a94a
SHA512554fd2161d85751e680ec02ff81718df22ff5ea41ea78a461a1d63497cab9701f8a27aeb3383b68a243832b55f699c44337dbfd8c8a025ff096779dd5347ce73
-
Filesize
13.3MB
MD5e615354d620941db592d304f53cbaddd
SHA1a89cd49f4f00b10afea77f44f73071a931858ae6
SHA2567445f20a8ab4450280b2baca433ccf6bd28763701686822f0595209850f1a94a
SHA512554fd2161d85751e680ec02ff81718df22ff5ea41ea78a461a1d63497cab9701f8a27aeb3383b68a243832b55f699c44337dbfd8c8a025ff096779dd5347ce73
-
Filesize
1024B
MD5b4ecba56f82e31510cf0ee604183871d
SHA16de710ee461c3f81e45f6ee607499e45fcbe75e1
SHA2560357e98a46cfd5620015b01278de1e4bb96d46f9878686da2c43ec93e6a0016a
SHA512ae6af40e002af35fb112574c1d22eb24e253a8c4582a9776fae021d18d6a71173cdcfa2b2623dd1200b6d7908041329983ec9cb01a8596f401d9de313e4d9611
-
Filesize
13.3MB
MD5e615354d620941db592d304f53cbaddd
SHA1a89cd49f4f00b10afea77f44f73071a931858ae6
SHA2567445f20a8ab4450280b2baca433ccf6bd28763701686822f0595209850f1a94a
SHA512554fd2161d85751e680ec02ff81718df22ff5ea41ea78a461a1d63497cab9701f8a27aeb3383b68a243832b55f699c44337dbfd8c8a025ff096779dd5347ce73
-
Filesize
13.3MB
MD5e615354d620941db592d304f53cbaddd
SHA1a89cd49f4f00b10afea77f44f73071a931858ae6
SHA2567445f20a8ab4450280b2baca433ccf6bd28763701686822f0595209850f1a94a
SHA512554fd2161d85751e680ec02ff81718df22ff5ea41ea78a461a1d63497cab9701f8a27aeb3383b68a243832b55f699c44337dbfd8c8a025ff096779dd5347ce73
-
Filesize
13.3MB
MD5e615354d620941db592d304f53cbaddd
SHA1a89cd49f4f00b10afea77f44f73071a931858ae6
SHA2567445f20a8ab4450280b2baca433ccf6bd28763701686822f0595209850f1a94a
SHA512554fd2161d85751e680ec02ff81718df22ff5ea41ea78a461a1d63497cab9701f8a27aeb3383b68a243832b55f699c44337dbfd8c8a025ff096779dd5347ce73