Analysis
-
max time kernel
68s -
max time network
55s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 22:42
Static task
static1
Behavioral task
behavioral1
Sample
64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe
Resource
win7-20220901-en
General
-
Target
64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe
-
Size
80KB
-
MD5
9152c47b664d6264004fab868dc2e477
-
SHA1
9cccb3876e93e2e1b2fd6ccfba4fd09ccc072719
-
SHA256
64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6
-
SHA512
0b6b973c1f8a1a54d095dc1b05c5b124e3ef9ac122a0d6d508befac9319840db88c8d5b6a09d65b519006e928faba82ad9e69afb0e9862d1fdc84a3170ef57ba
-
SSDEEP
768:TfjvYlr6UichjU2skt0noxx3HzDS9pVaWl8z9QDqFftBC2j9cuXSqlEDEAnG5mxY:TgrBjvtMopgetM21iLrbZBNfoJki
Malware Config
Extracted
pony
http://leodkat.pw:681/fix/update.php
http://vpalero.pw:681/fix/update.php
Signatures
-
resource yara_rule behavioral1/memory/1252-54-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/1252-55-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/1252-56-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/1252-61-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/1252-62-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/1252-63-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/1252-68-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1880 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1760 set thread context of 1252 1760 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 27 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\calc2.exe 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1088 PING.EXE -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeImpersonatePrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeTcbPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeChangeNotifyPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeCreateTokenPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeBackupPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeRestorePrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeIncreaseQuotaPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeAssignPrimaryTokenPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeImpersonatePrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeTcbPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeChangeNotifyPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeCreateTokenPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeBackupPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeRestorePrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeIncreaseQuotaPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeAssignPrimaryTokenPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeImpersonatePrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeTcbPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeChangeNotifyPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeCreateTokenPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeBackupPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeRestorePrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeIncreaseQuotaPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeAssignPrimaryTokenPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeImpersonatePrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeTcbPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeChangeNotifyPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeCreateTokenPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeBackupPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeRestorePrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeIncreaseQuotaPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeAssignPrimaryTokenPrivilege 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1252 1760 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 27 PID 1760 wrote to memory of 1252 1760 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 27 PID 1760 wrote to memory of 1252 1760 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 27 PID 1760 wrote to memory of 1252 1760 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 27 PID 1760 wrote to memory of 1252 1760 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 27 PID 1760 wrote to memory of 1252 1760 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 27 PID 1760 wrote to memory of 1252 1760 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 27 PID 1760 wrote to memory of 1252 1760 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 27 PID 1760 wrote to memory of 1252 1760 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 27 PID 1252 wrote to memory of 560 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 28 PID 1252 wrote to memory of 560 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 28 PID 1252 wrote to memory of 560 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 28 PID 1252 wrote to memory of 560 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 28 PID 560 wrote to memory of 1576 560 cmd.exe 30 PID 560 wrote to memory of 1576 560 cmd.exe 30 PID 560 wrote to memory of 1576 560 cmd.exe 30 PID 560 wrote to memory of 1576 560 cmd.exe 30 PID 1252 wrote to memory of 1880 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 31 PID 1252 wrote to memory of 1880 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 31 PID 1252 wrote to memory of 1880 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 31 PID 1252 wrote to memory of 1880 1252 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 31 PID 1880 wrote to memory of 1088 1880 cmd.exe 33 PID 1880 wrote to memory of 1088 1880 cmd.exe 33 PID 1880 wrote to memory of 1088 1880 cmd.exe 33 PID 1880 wrote to memory of 1088 1880 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe"C:\Users\Admin\AppData\Local\Temp\64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe"C:\Users\Admin\AppData\Local\Temp\64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c at 03:53:00 /every:T,M,Th,F,W,S,Su wmic.exe nicconfig where "IPEnabled=true" call SetDNSServerSearchOrder ("37.10.116.201", "8.8.8.8")3⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\at.exeat 03:53:00 /every:T,M,Th,F,W,S,Su wmic.exe nicconfig where "IPEnabled=true" call SetDNSServerSearchOrder ("37.10.116.201", "8.8.8.8")4⤵PID:1576
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -n 10 localhost && erase "C:\Users\Admin\AppData\Local\Temp\64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:1088
-
-
-