Analysis
-
max time kernel
137s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 22:42
Static task
static1
Behavioral task
behavioral1
Sample
64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe
Resource
win7-20220901-en
General
-
Target
64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe
-
Size
80KB
-
MD5
9152c47b664d6264004fab868dc2e477
-
SHA1
9cccb3876e93e2e1b2fd6ccfba4fd09ccc072719
-
SHA256
64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6
-
SHA512
0b6b973c1f8a1a54d095dc1b05c5b124e3ef9ac122a0d6d508befac9319840db88c8d5b6a09d65b519006e928faba82ad9e69afb0e9862d1fdc84a3170ef57ba
-
SSDEEP
768:TfjvYlr6UichjU2skt0noxx3HzDS9pVaWl8z9QDqFftBC2j9cuXSqlEDEAnG5mxY:TgrBjvtMopgetM21iLrbZBNfoJki
Malware Config
Extracted
pony
http://leodkat.pw:681/fix/update.php
http://vpalero.pw:681/fix/update.php
Signatures
-
resource yara_rule behavioral2/memory/1360-132-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1360-133-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1360-134-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1360-139-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1360-140-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1360-141-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1360-142-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1360-147-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4620 set thread context of 1360 4620 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 81 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\calc2.exe 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2912 PING.EXE -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeImpersonatePrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeTcbPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeChangeNotifyPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeCreateTokenPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeBackupPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeRestorePrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeIncreaseQuotaPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeAssignPrimaryTokenPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeImpersonatePrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeTcbPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeChangeNotifyPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeCreateTokenPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeBackupPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeRestorePrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeIncreaseQuotaPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeAssignPrimaryTokenPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeImpersonatePrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeTcbPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeChangeNotifyPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeCreateTokenPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeBackupPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeRestorePrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeIncreaseQuotaPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeAssignPrimaryTokenPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeImpersonatePrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeTcbPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeChangeNotifyPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeCreateTokenPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeBackupPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeRestorePrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeIncreaseQuotaPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeAssignPrimaryTokenPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeImpersonatePrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeTcbPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeChangeNotifyPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeCreateTokenPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeBackupPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeRestorePrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeIncreaseQuotaPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeAssignPrimaryTokenPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeImpersonatePrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeTcbPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeChangeNotifyPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeCreateTokenPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeBackupPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeRestorePrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeIncreaseQuotaPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe Token: SeAssignPrimaryTokenPrivilege 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4620 wrote to memory of 1360 4620 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 81 PID 4620 wrote to memory of 1360 4620 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 81 PID 4620 wrote to memory of 1360 4620 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 81 PID 4620 wrote to memory of 1360 4620 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 81 PID 4620 wrote to memory of 1360 4620 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 81 PID 4620 wrote to memory of 1360 4620 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 81 PID 4620 wrote to memory of 1360 4620 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 81 PID 4620 wrote to memory of 1360 4620 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 81 PID 1360 wrote to memory of 4992 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 83 PID 1360 wrote to memory of 4992 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 83 PID 1360 wrote to memory of 4992 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 83 PID 4992 wrote to memory of 1924 4992 cmd.exe 85 PID 4992 wrote to memory of 1924 4992 cmd.exe 85 PID 4992 wrote to memory of 1924 4992 cmd.exe 85 PID 1360 wrote to memory of 432 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 86 PID 1360 wrote to memory of 432 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 86 PID 1360 wrote to memory of 432 1360 64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe 86 PID 432 wrote to memory of 2912 432 cmd.exe 88 PID 432 wrote to memory of 2912 432 cmd.exe 88 PID 432 wrote to memory of 2912 432 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe"C:\Users\Admin\AppData\Local\Temp\64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe"C:\Users\Admin\AppData\Local\Temp\64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c at 05:53:00 /every:T,M,Th,F,W,S,Su wmic.exe nicconfig where "IPEnabled=true" call SetDNSServerSearchOrder ("37.10.116.201", "8.8.8.8")3⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\at.exeat 05:53:00 /every:T,M,Th,F,W,S,Su wmic.exe nicconfig where "IPEnabled=true" call SetDNSServerSearchOrder ("37.10.116.201", "8.8.8.8")4⤵PID:1924
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -n 10 localhost && erase "C:\Users\Admin\AppData\Local\Temp\64b0d1bdf43283a6c13df1ec6fbc45b5e4c3a7fd78fbf2c5b434bf4713e555d6.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:2912
-
-
-