Behavioral task
behavioral1
Sample
a30b9b63cd91b68cc08e45a295f413b7e06a7f80c578a12c8cd5fccb04178be2.exe
Resource
win7-20220901-en
General
-
Target
a30b9b63cd91b68cc08e45a295f413b7e06a7f80c578a12c8cd5fccb04178be2
-
Size
84KB
-
MD5
ba2425765485d37847482422fc2b1273
-
SHA1
8b4538c3e3e01919b9e8192d22a471ee40103e95
-
SHA256
a30b9b63cd91b68cc08e45a295f413b7e06a7f80c578a12c8cd5fccb04178be2
-
SHA512
a9fdd4cf07ff4030f1047242a1d02b55e7640e6541fd684a2a5704c6deac719b461dec9e64fd91880334ff65904ad2aebe70fe8f3a9808fa00ffa21b68ed9ae6
-
SSDEEP
1536:9Tbfx6QAkmLqTY+qf0SDS5ZvZG3Qrvgw3I618P5DTvekzbTzq/5:tb5TAkmF0SDSmQrbIG8Ptfq/5
Malware Config
Extracted
pony
http://www.newyorkcityindustrialboilerrepair.com/fingers/panel/gate.php
Signatures
-
Pony family
Files
-
a30b9b63cd91b68cc08e45a295f413b7e06a7f80c578a12c8cd5fccb04178be2.exe windows x86
88beadee8be3a02ce03d3f55f08c8251
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
ReadFile
CloseHandle
WriteFile
lstrlenA
GlobalLock
GlobalUnlock
LocalFree
LocalAlloc
GetTickCount
lstrcpyA
lstrcatA
GetFileAttributesA
ExpandEnvironmentStringsA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
LoadLibraryA
GetProcAddress
GetTempPathA
CreateDirectoryA
DeleteFileA
GetCurrentProcess
WideCharToMultiByte
GetLastError
lstrcmpA
CreateToolhelp32Snapshot
Process32First
OpenProcess
Process32Next
FindFirstFileA
lstrcmpiA
FindNextFileA
FindClose
GetModuleHandleA
GetVersionExA
GetLocaleInfoA
GetSystemInfo
GetWindowsDirectoryA
GetPrivateProfileStringA
SetCurrentDirectoryA
GetPrivateProfileSectionNamesA
GetPrivateProfileIntA
GetCurrentDirectoryA
lstrlenW
MultiByteToWideChar
Sleep
LCMapStringA
ExitProcess
SetUnhandledExceptionFilter
ole32
CreateStreamOnHGlobal
GetHGlobalFromStream
CoCreateGuid
CoTaskMemFree
OleInitialize
user32
wsprintfA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
RegEnumKeyExA
RegCreateKeyA
RegSetValueExA
IsTextUnicode
RegOpenCurrentUser
RegEnumValueA
GetUserNameA
wininet
InternetCrackUrlA
InternetCreateUrlA
shlwapi
StrStrIA
StrRChrIA
StrToIntA
StrStrA
StrCmpNIA
urlmon
ObtainUserAgentString
wsock32
inet_addr
gethostbyname
socket
connect
closesocket
send
select
recv
setsockopt
WSAStartup
userenv
LoadUserProfileA
UnloadUserProfile
Sections
.text Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE