Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 18:43

General

  • Target

    1721775c6d33bf147d0eec83f5b8e92b1e8ebf3baae9dd9fd77c189fe79f2324.exe

  • Size

    324KB

  • MD5

    7d05eebdb0afe7c4c4d5231eaa271118

  • SHA1

    ae2c8059389887f0028ae61c89fd65d878eea7b4

  • SHA256

    1721775c6d33bf147d0eec83f5b8e92b1e8ebf3baae9dd9fd77c189fe79f2324

  • SHA512

    46a250708d573966313dd28e1b3db546634c58bb886fdda667208ae9608048521bd6a8a8d529c68cd447bc419f773952b559cd555c911aea940335768d3369e6

  • SSDEEP

    6144:a4w/TEf3zR2c++Mr4sIJbWGQ4w/TEJpnss2XjXrHPWftnyBXMxoMKk:xqgvzMrrnIYSqgJZss0jX7uB6uoMb

Malware Config

Extracted

Family

pony

C2

http://raslo1.bangex.com/regate/regate.php

http://dll1.dinos.al/regate/regate.php

http://dll1-b.dinos.al/regate/regate.php

http://dll1-c.dinos.al/regate/regate.php

Signatures

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Executes dropped EXE 4 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1721775c6d33bf147d0eec83f5b8e92b1e8ebf3baae9dd9fd77c189fe79f2324.exe
    "C:\Users\Admin\AppData\Local\Temp\1721775c6d33bf147d0eec83f5b8e92b1e8ebf3baae9dd9fd77c189fe79f2324.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\AppData\Local\Temp\tmp7562839.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp7562839.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\Users\Admin\AppData\Local\Temp\tmp7562839.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp7562839.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1400
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:872
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1712
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe
              6⤵
              • Suspicious behavior: MapViewOfSection
              PID:832
    • C:\Users\Admin\AppData\Local\Temp\1721775c6d33bf147d0eec83f5b8e92b1e8ebf3baae9dd9fd77c189fe79f2324.exe
      "C:\Users\Admin\AppData\Local\Temp\1721775c6d33bf147d0eec83f5b8e92b1e8ebf3baae9dd9fd77c189fe79f2324.exe"
      2⤵
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of AdjustPrivilegeToken
      • outlook_win_path
      PID:976

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp7562839.exe

    Filesize

    164KB

    MD5

    ee86a6eb2f94db6c8caa0b95bc468174

    SHA1

    b07fef1c69176369a6f09da5a2359d062b2d0c65

    SHA256

    fd1d70cf0753ad0e290126caab6445f66940c242309fdcb7792354657948ac3e

    SHA512

    eb82b97602fae6dcb352b34f8dc24267b29584ff9ed86d7b6445a6b5316363d1ef8f66946852dba2eb5aae327271373ba60743b7998472bf9c9528a7eeb045a6

  • C:\Users\Admin\AppData\Local\Temp\tmp7562839.exe

    Filesize

    164KB

    MD5

    ee86a6eb2f94db6c8caa0b95bc468174

    SHA1

    b07fef1c69176369a6f09da5a2359d062b2d0c65

    SHA256

    fd1d70cf0753ad0e290126caab6445f66940c242309fdcb7792354657948ac3e

    SHA512

    eb82b97602fae6dcb352b34f8dc24267b29584ff9ed86d7b6445a6b5316363d1ef8f66946852dba2eb5aae327271373ba60743b7998472bf9c9528a7eeb045a6

  • C:\Users\Admin\AppData\Local\Temp\tmp7562839.exe

    Filesize

    164KB

    MD5

    ee86a6eb2f94db6c8caa0b95bc468174

    SHA1

    b07fef1c69176369a6f09da5a2359d062b2d0c65

    SHA256

    fd1d70cf0753ad0e290126caab6445f66940c242309fdcb7792354657948ac3e

    SHA512

    eb82b97602fae6dcb352b34f8dc24267b29584ff9ed86d7b6445a6b5316363d1ef8f66946852dba2eb5aae327271373ba60743b7998472bf9c9528a7eeb045a6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe

    Filesize

    164KB

    MD5

    ee86a6eb2f94db6c8caa0b95bc468174

    SHA1

    b07fef1c69176369a6f09da5a2359d062b2d0c65

    SHA256

    fd1d70cf0753ad0e290126caab6445f66940c242309fdcb7792354657948ac3e

    SHA512

    eb82b97602fae6dcb352b34f8dc24267b29584ff9ed86d7b6445a6b5316363d1ef8f66946852dba2eb5aae327271373ba60743b7998472bf9c9528a7eeb045a6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe

    Filesize

    164KB

    MD5

    ee86a6eb2f94db6c8caa0b95bc468174

    SHA1

    b07fef1c69176369a6f09da5a2359d062b2d0c65

    SHA256

    fd1d70cf0753ad0e290126caab6445f66940c242309fdcb7792354657948ac3e

    SHA512

    eb82b97602fae6dcb352b34f8dc24267b29584ff9ed86d7b6445a6b5316363d1ef8f66946852dba2eb5aae327271373ba60743b7998472bf9c9528a7eeb045a6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe

    Filesize

    164KB

    MD5

    ee86a6eb2f94db6c8caa0b95bc468174

    SHA1

    b07fef1c69176369a6f09da5a2359d062b2d0c65

    SHA256

    fd1d70cf0753ad0e290126caab6445f66940c242309fdcb7792354657948ac3e

    SHA512

    eb82b97602fae6dcb352b34f8dc24267b29584ff9ed86d7b6445a6b5316363d1ef8f66946852dba2eb5aae327271373ba60743b7998472bf9c9528a7eeb045a6

  • \Users\Admin\AppData\Local\Temp\tmp7562839.exe

    Filesize

    164KB

    MD5

    ee86a6eb2f94db6c8caa0b95bc468174

    SHA1

    b07fef1c69176369a6f09da5a2359d062b2d0c65

    SHA256

    fd1d70cf0753ad0e290126caab6445f66940c242309fdcb7792354657948ac3e

    SHA512

    eb82b97602fae6dcb352b34f8dc24267b29584ff9ed86d7b6445a6b5316363d1ef8f66946852dba2eb5aae327271373ba60743b7998472bf9c9528a7eeb045a6

  • \Users\Admin\AppData\Local\Temp\tmp7562839.exe

    Filesize

    164KB

    MD5

    ee86a6eb2f94db6c8caa0b95bc468174

    SHA1

    b07fef1c69176369a6f09da5a2359d062b2d0c65

    SHA256

    fd1d70cf0753ad0e290126caab6445f66940c242309fdcb7792354657948ac3e

    SHA512

    eb82b97602fae6dcb352b34f8dc24267b29584ff9ed86d7b6445a6b5316363d1ef8f66946852dba2eb5aae327271373ba60743b7998472bf9c9528a7eeb045a6

  • \Users\Admin\AppData\Local\Temp\tmp7562839.exe

    Filesize

    164KB

    MD5

    ee86a6eb2f94db6c8caa0b95bc468174

    SHA1

    b07fef1c69176369a6f09da5a2359d062b2d0c65

    SHA256

    fd1d70cf0753ad0e290126caab6445f66940c242309fdcb7792354657948ac3e

    SHA512

    eb82b97602fae6dcb352b34f8dc24267b29584ff9ed86d7b6445a6b5316363d1ef8f66946852dba2eb5aae327271373ba60743b7998472bf9c9528a7eeb045a6

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe

    Filesize

    164KB

    MD5

    ee86a6eb2f94db6c8caa0b95bc468174

    SHA1

    b07fef1c69176369a6f09da5a2359d062b2d0c65

    SHA256

    fd1d70cf0753ad0e290126caab6445f66940c242309fdcb7792354657948ac3e

    SHA512

    eb82b97602fae6dcb352b34f8dc24267b29584ff9ed86d7b6445a6b5316363d1ef8f66946852dba2eb5aae327271373ba60743b7998472bf9c9528a7eeb045a6

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe

    Filesize

    164KB

    MD5

    ee86a6eb2f94db6c8caa0b95bc468174

    SHA1

    b07fef1c69176369a6f09da5a2359d062b2d0c65

    SHA256

    fd1d70cf0753ad0e290126caab6445f66940c242309fdcb7792354657948ac3e

    SHA512

    eb82b97602fae6dcb352b34f8dc24267b29584ff9ed86d7b6445a6b5316363d1ef8f66946852dba2eb5aae327271373ba60743b7998472bf9c9528a7eeb045a6

  • memory/756-56-0x0000000075831000-0x0000000075833000-memory.dmp

    Filesize

    8KB

  • memory/756-57-0x00000000006AF000-0x00000000006C1000-memory.dmp

    Filesize

    72KB

  • memory/756-58-0x0000000002591000-0x0000000002ADD000-memory.dmp

    Filesize

    5.3MB

  • memory/832-104-0x0000000000060000-0x0000000000087000-memory.dmp

    Filesize

    156KB

  • memory/832-101-0x0000000000000000-mapping.dmp

  • memory/872-85-0x000000000055F000-0x0000000000577000-memory.dmp

    Filesize

    96KB

  • memory/872-87-0x000000000055F000-0x0000000000577000-memory.dmp

    Filesize

    96KB

  • memory/872-88-0x000000000055F000-0x0000000000577000-memory.dmp

    Filesize

    96KB

  • memory/872-78-0x0000000000000000-mapping.dmp

  • memory/872-91-0x000000000055F000-0x0000000000577000-memory.dmp

    Filesize

    96KB

  • memory/872-94-0x000000000055F000-0x0000000000577000-memory.dmp

    Filesize

    96KB

  • memory/976-74-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/976-110-0x00000000001B0000-0x00000000001C8000-memory.dmp

    Filesize

    96KB

  • memory/976-107-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/976-66-0x0000000000410028-mapping.dmp

  • memory/976-112-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/976-111-0x0000000000260000-0x0000000000271000-memory.dmp

    Filesize

    68KB

  • memory/976-64-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/1192-108-0x0000000001C60000-0x0000000001C87000-memory.dmp

    Filesize

    156KB

  • memory/1220-109-0x00000000001D0000-0x00000000001F7000-memory.dmp

    Filesize

    156KB

  • memory/1284-105-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/1284-106-0x0000000002A00000-0x0000000002A27000-memory.dmp

    Filesize

    156KB

  • memory/1400-79-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/1400-72-0x0000000000401000-mapping.dmp

  • memory/1400-71-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/1528-68-0x0000000000620000-0x0000000000638000-memory.dmp

    Filesize

    96KB

  • memory/1528-61-0x0000000000000000-mapping.dmp

  • memory/1712-102-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/1712-103-0x00000000002B0000-0x00000000002D7000-memory.dmp

    Filesize

    156KB

  • memory/1712-98-0x0000000000401000-mapping.dmp