Analysis
-
max time kernel
167s -
max time network
177s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-10-2022 22:09
Static task
static1
Behavioral task
behavioral1
Sample
db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe
Resource
win10v2004-20220812-en
General
-
Target
db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe
-
Size
119KB
-
MD5
4328a1ed7c8ecc6801edcce7c51a85fb
-
SHA1
9ca512264a89b6e451f6d6f2c73308e4ffb4eb49
-
SHA256
db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77
-
SHA512
566e988d4b1cedeb5f901c75d581d2aa0d4e00f85b892e1c9d40ff93d49c04d26f2cdae88a238c4b073d90725ab93b5405c210d196436f8918b96f06bbffa7bd
-
SSDEEP
3072:87hdr+bkUAe6e7zPeJ2ntg5Qzx+MoqFtZ:SPr7je6qbtg5NqF
Malware Config
Extracted
pony
http://1800callabe.com/ponyz/gate.php
http://1866callabe.com/ponyz/gate.php
http://abemoussa.com/ponyz/gate.php
http://abemuggs.com/ponyz/gate.php
-
payload_url
http://bluewebtech.co.za/bSe8t.exe
http://beary.us/KW7mcajw.exe
http://chuck.fanzoom.net/xoAbVd.exe
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exedescription pid process Token: SeImpersonatePrivilege 1168 db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe Token: SeTcbPrivilege 1168 db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe Token: SeChangeNotifyPrivilege 1168 db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe Token: SeCreateTokenPrivilege 1168 db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe Token: SeBackupPrivilege 1168 db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe Token: SeRestorePrivilege 1168 db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe Token: SeIncreaseQuotaPrivilege 1168 db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe Token: SeAssignPrimaryTokenPrivilege 1168 db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe -
outlook_win_path 1 IoCs
Processes:
db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe"C:\Users\Admin\AppData\Local\Temp\db46b1c61cb9bd314cbab6fec89abc89f256e7bb691b0f77d1eee8da1f59ef77.exe"1⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path