Analysis

  • max time kernel
    134s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 01:08

General

  • Target

    6cdcfd97a0955208e5dd00f328610aee1c2c7d3cc3353012de580cdb04d93a03.exe

  • Size

    108KB

  • MD5

    6e65a62804f1bf9ab7ee3a74412639d0

  • SHA1

    d8286779b0eff4bf88525a0d74fe2e46a5a739e8

  • SHA256

    6cdcfd97a0955208e5dd00f328610aee1c2c7d3cc3353012de580cdb04d93a03

  • SHA512

    944f52e7ecd92f36139b34a7269b9d7e4b6412305127dcbe1e508fc95584a7772de9b5054ae6b0d7016f6823d933ba940ee6068368e4bfe2ceed7c3f76628b12

  • SSDEEP

    1536:ZhhqTEincoMNbZSpSYi6gLeXxliJKwQJm7tpp7PYBSGV2L5E2fMHxKgwC:LKEincoYSpSY1MeBlMBppsBBIV1Uw

Malware Config

Extracted

Family

pony

C2

http://admin.vojtekracing.hu:8080/forum/viewtopic.php

http://media.vojtekracing.hu:8080/forum/viewtopic.php

http://vojtekracing.hu:8080/forum/viewtopic.php

http://195.5.208.204:8080/forum/viewtopic.php

Attributes
  • payload_url

    http://www.depostduif.com/CgSe7PMo/Wq9YM.exe

    http://02b123c.netsolhost.com/2pNzchs3/RtH.exe

    http://etaphavacilik.com/D3ppyZsm/BYQ.exe

    http://hc121012.smartconfig.net/UqzyfYAz/KXsRz4.exe

    http://matrimonialz.com/teT5MwkC/zv9B.exe

    http://www.eicher-fenster.de/tWUmLKoB/SPijrE.exe

Signatures

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6cdcfd97a0955208e5dd00f328610aee1c2c7d3cc3353012de580cdb04d93a03.exe
    "C:\Users\Admin\AppData\Local\Temp\6cdcfd97a0955208e5dd00f328610aee1c2c7d3cc3353012de580cdb04d93a03.exe"
    1⤵
    • Accesses Microsoft Outlook accounts
    • Accesses Microsoft Outlook profiles
    • Suspicious use of AdjustPrivilegeToken
    • outlook_win_path
    PID:1760

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1760-55-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB

  • memory/1760-56-0x0000000075281000-0x0000000075283000-memory.dmp
    Filesize

    8KB

  • memory/1760-54-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB