Analysis
-
max time kernel
205s -
max time network
239s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 08:51
Static task
static1
Behavioral task
behavioral1
Sample
29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe
Resource
win7-20220812-en
General
-
Target
29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe
-
Size
204KB
-
MD5
0f957a264a82ec6e275def7b38bd80f9
-
SHA1
2073b738f80573f0796d5d591c00983e05ba0940
-
SHA256
29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8
-
SHA512
706834a86872259c43695f8445a063fe8b2a72e094c826ba5648ca5b26c40462bd0c756686a4746c8cf19268505a25bfb7f47a3ead00a69e08308a2aae5f2ec7
-
SSDEEP
3072:66WgE6TQkriqLQq+DIZQbQysVGj+8yygsdrCy52VFwdL4KlpKRcgv:6p6rByZS5orwN
Malware Config
Extracted
pony
http://ramzey.net/kilo/gate.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exedescription pid process target process PID 3888 set thread context of 2672 3888 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exedescription pid process Token: SeImpersonatePrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeTcbPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeChangeNotifyPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeCreateTokenPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeBackupPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeRestorePrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeIncreaseQuotaPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeAssignPrimaryTokenPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeImpersonatePrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeTcbPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeChangeNotifyPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeCreateTokenPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeBackupPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeRestorePrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeIncreaseQuotaPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeAssignPrimaryTokenPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeImpersonatePrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeTcbPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeChangeNotifyPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeCreateTokenPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeBackupPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeRestorePrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeIncreaseQuotaPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeAssignPrimaryTokenPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeImpersonatePrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeTcbPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeChangeNotifyPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeCreateTokenPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeBackupPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeRestorePrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeIncreaseQuotaPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeAssignPrimaryTokenPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeImpersonatePrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeTcbPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeChangeNotifyPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeCreateTokenPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeBackupPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeRestorePrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeIncreaseQuotaPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeAssignPrimaryTokenPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeImpersonatePrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeTcbPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeChangeNotifyPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeCreateTokenPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeBackupPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeRestorePrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeIncreaseQuotaPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe Token: SeAssignPrimaryTokenPrivilege 2672 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exepid process 3888 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exenet.exedescription pid process target process PID 3888 wrote to memory of 4276 3888 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe net.exe PID 3888 wrote to memory of 4276 3888 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe net.exe PID 3888 wrote to memory of 4276 3888 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe net.exe PID 4276 wrote to memory of 1800 4276 net.exe net1.exe PID 4276 wrote to memory of 1800 4276 net.exe net1.exe PID 4276 wrote to memory of 1800 4276 net.exe net1.exe PID 3888 wrote to memory of 2672 3888 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe PID 3888 wrote to memory of 2672 3888 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe PID 3888 wrote to memory of 2672 3888 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe PID 3888 wrote to memory of 2672 3888 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe PID 3888 wrote to memory of 2672 3888 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe PID 3888 wrote to memory of 2672 3888 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe PID 3888 wrote to memory of 2672 3888 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe PID 3888 wrote to memory of 2672 3888 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe -
outlook_win_path 1 IoCs
Processes:
29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe"C:\Users\Admin\AppData\Local\Temp\29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop sharedaccess2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess3⤵
-
C:\Users\Admin\AppData\Local\Temp\29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe"C:\Users\Admin\AppData\Local\Temp\29388fe3d11fe7b03e5a52bfeae8a77558ab901149140c6e28a04f2c44bdfcf8.exe"2⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1800-175-0x0000000000000000-mapping.dmp
-
memory/2672-182-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/2672-181-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/2672-180-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/2672-179-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/2672-177-0x0000000000400000-0x0000000000419000-memory.dmpFilesize
100KB
-
memory/2672-176-0x0000000000000000-mapping.dmp
-
memory/3888-157-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-160-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-143-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-144-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-145-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-146-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-148-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-149-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-150-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-151-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-152-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-153-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-154-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-155-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-156-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-132-0x0000000001100000-0x0000000001134000-memory.dmpFilesize
208KB
-
memory/3888-158-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-159-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-162-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-142-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-161-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-163-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-164-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-165-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-166-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-167-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-168-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-169-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-170-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-172-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-171-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-173-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-135-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-141-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-140-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-139-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-137-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-138-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/3888-136-0x0000000001101000-0x0000000001117000-memory.dmpFilesize
88KB
-
memory/4276-174-0x0000000000000000-mapping.dmp