Analysis
-
max time kernel
173s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 07:44
Static task
static1
Behavioral task
behavioral1
Sample
6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe
Resource
win7-20220812-en
General
-
Target
6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe
-
Size
237KB
-
MD5
a84b16eb2ff0eb6020b10c887718c104
-
SHA1
deae21b3d604ac9017b27d8c3f3402ab7b9fe262
-
SHA256
6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb
-
SHA512
bf1f62ace10a90c0b58cc298c012dc5971e5a1d9df912cabc2c85648829fa4a91e113dcdb5f1b7b0fda96a4569bedb51cd9b515c5817f14037d91064903558a1
-
SSDEEP
3072:sqLbk7jYEE/RuMH5ObkF855eOetSaU8utZfIzezujB4lZ3aOSNZ:1LbQJpSvFg8X1cgzeO4GR
Malware Config
Extracted
pony
http://shareyourtraffic.com/po/gate.php
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exedescription pid process target process PID 4392 set thread context of 2896 4392 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exepid process 4392 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe 4392 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exedescription pid process Token: SeImpersonatePrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeTcbPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeChangeNotifyPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeCreateTokenPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeBackupPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeRestorePrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeIncreaseQuotaPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeAssignPrimaryTokenPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeImpersonatePrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeTcbPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeChangeNotifyPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeCreateTokenPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeBackupPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeRestorePrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeIncreaseQuotaPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeAssignPrimaryTokenPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeImpersonatePrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeTcbPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeChangeNotifyPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeCreateTokenPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeBackupPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeRestorePrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeIncreaseQuotaPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeAssignPrimaryTokenPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeImpersonatePrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeTcbPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeChangeNotifyPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeCreateTokenPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeBackupPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeRestorePrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeIncreaseQuotaPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeAssignPrimaryTokenPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeImpersonatePrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeTcbPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeChangeNotifyPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeCreateTokenPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeBackupPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeRestorePrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeIncreaseQuotaPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeAssignPrimaryTokenPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeImpersonatePrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeTcbPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeChangeNotifyPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeCreateTokenPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeBackupPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeRestorePrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeIncreaseQuotaPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe Token: SeAssignPrimaryTokenPrivilege 2896 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exedescription pid process target process PID 4392 wrote to memory of 2896 4392 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe PID 4392 wrote to memory of 2896 4392 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe PID 4392 wrote to memory of 2896 4392 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe -
outlook_win_path 1 IoCs
Processes:
6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe"C:\Users\Admin\AppData\Local\Temp\6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe"C:\Users\Admin\AppData\Local\Temp\6ad9dd56ae1823b79de31b627e1bb90480704d186ce018ddafc46ae8322602cb.exe"2⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
PID:2896