Analysis
-
max time kernel
125s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:46
Static task
static1
Behavioral task
behavioral1
Sample
8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe
Resource
win7-20220812-en
General
-
Target
8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe
-
Size
120KB
-
MD5
bf64c727278d78862ffb11e287b3cea8
-
SHA1
50088179810d1e10678e728efe24d498ad485adf
-
SHA256
8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017
-
SHA512
4117e63149dc30e8934cd1baa46198172d818679d6dd6ef1da1217d2865aa335b6a4b46ba1191e2c5386408a4391be5f9aa186b29c1d7865ca5a5caaa684036b
-
SSDEEP
1536:zAtvvI0f+RIg9CG5lsIlKMj0b7UADGyXuuWi3hUbPYIX+U:zAtv0RIg9CdcKMaiiuuWshBU
Malware Config
Extracted
pony
http://178.207.18.188:8080/pnn/404.php
-
payload_url
http://zusso.jp/444.exe
http://interativaonline.com/444.exe
http://elsy.pwp.blueyonder.co.uk/444.exe
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4876-133-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4876-136-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4876-137-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4876-138-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4876-139-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4876-140-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exedescription pid process target process PID 1484 set thread context of 4876 1484 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exepid process 1484 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe 1484 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe 1484 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe 1484 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exedescription pid process Token: SeImpersonatePrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeTcbPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeChangeNotifyPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeCreateTokenPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeBackupPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeRestorePrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeIncreaseQuotaPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeAssignPrimaryTokenPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeImpersonatePrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeTcbPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeChangeNotifyPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeCreateTokenPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeBackupPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeRestorePrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeIncreaseQuotaPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeAssignPrimaryTokenPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeImpersonatePrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeTcbPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeChangeNotifyPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeCreateTokenPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeBackupPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeRestorePrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeIncreaseQuotaPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeAssignPrimaryTokenPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeImpersonatePrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeTcbPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeChangeNotifyPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeCreateTokenPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeBackupPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeRestorePrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeIncreaseQuotaPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeAssignPrimaryTokenPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeImpersonatePrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeTcbPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeChangeNotifyPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeCreateTokenPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeBackupPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeRestorePrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeIncreaseQuotaPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeAssignPrimaryTokenPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeImpersonatePrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeTcbPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeChangeNotifyPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeCreateTokenPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeBackupPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeRestorePrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeIncreaseQuotaPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe Token: SeAssignPrimaryTokenPrivilege 4876 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exepid process 1484 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe 1484 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exedescription pid process target process PID 1484 wrote to memory of 4876 1484 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe PID 1484 wrote to memory of 4876 1484 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe PID 1484 wrote to memory of 4876 1484 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe PID 1484 wrote to memory of 4876 1484 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe PID 1484 wrote to memory of 4876 1484 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe PID 1484 wrote to memory of 4876 1484 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe PID 1484 wrote to memory of 4876 1484 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe PID 1484 wrote to memory of 4876 1484 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe -
outlook_win_path 1 IoCs
Processes:
8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe"C:\Users\Admin\AppData\Local\Temp\8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exeC:\Users\Admin\AppData\Local\Temp\8ea81b9fb29c04d16f5901577dc6e6fa93f5e3fce4e0c57e9c37eef94367c017.exe2⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
PID:4876