Analysis
-
max time kernel
34s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 09:08
Static task
static1
Behavioral task
behavioral1
Sample
9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe
Resource
win7-20220812-en
General
-
Target
9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe
-
Size
150KB
-
MD5
20c5da24b41122a380b1f4c23440d14d
-
SHA1
c0f4e1b36289f94bfbba1d0916910fce0251df8c
-
SHA256
9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f
-
SHA512
bd063618a552f66dc8f054f7bf85ec089300a0109db0606e7d75ef1dadd2c8ae256ecd40ac19a3ae4fe6fa17ad0f811b74ef7836547a426f11465e56c08fd5ce
-
SSDEEP
3072:ipCb/OGHTTNK5OVPE6xG4QtsE5nro7tJ7aWtYu6M4SEiFCDGHI8:I6ofOHaWtYu6BDV
Malware Config
Extracted
pony
http://pontysss.dyndns.dk/pontorez/gate.php
http://ponytd.dyndns.dk/pontorez/gate.php
http://pontyd.dyndns.dk/pontorez/gate.php
http://weree.dyndns.dk/pontorez/gate.php
http://amaster.dyndns.dk/pontorez/gate.php
-
payload_url
http://ponytd.dyndns.dk/pontorez/bin/1.exe
http://ponytd.dyndns.dk/pontorez/bin/2.exe
http://ponytd.dyndns.dk/pontorez/bin/3.exe
http://ponytd.dyndns.dk/pontorez/bin/4.exe
http://pontyd.dyndns.dk/pontorez/bin/1.exe
http://pontyd.dyndns.dk/pontorez/bin/2.exe
http://pontyd.dyndns.dk/pontorez/bin/3.exe
http://pontyd.dyndns.dk/pontorez/bin/4.exe
http://weree.dyndns.dk/pontorez/bin/1.exe
http://weree.dyndns.dk/pontorez/bin/2.exe
http://weree.dyndns.dk/pontorez/bin/3.exe
http://weree.dyndns.dk/pontorez/bin/4.exe
Signatures
-
Processes:
resource yara_rule behavioral1/memory/896-58-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/896-60-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/896-62-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/896-66-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/896-67-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/896-68-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/896-69-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/896-70-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exedescription pid process target process PID 1224 set thread context of 896 1224 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
Processes:
9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exedescription pid process Token: SeImpersonatePrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeTcbPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeChangeNotifyPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeCreateTokenPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeBackupPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeRestorePrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeIncreaseQuotaPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeAssignPrimaryTokenPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeImpersonatePrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeTcbPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeChangeNotifyPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeCreateTokenPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeBackupPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeRestorePrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeIncreaseQuotaPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeAssignPrimaryTokenPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeImpersonatePrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeTcbPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeChangeNotifyPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeCreateTokenPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeBackupPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeRestorePrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeIncreaseQuotaPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeAssignPrimaryTokenPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeImpersonatePrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeTcbPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeChangeNotifyPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeCreateTokenPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeBackupPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeRestorePrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeIncreaseQuotaPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe Token: SeAssignPrimaryTokenPrivilege 896 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exedescription pid process target process PID 1224 wrote to memory of 896 1224 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe PID 1224 wrote to memory of 896 1224 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe PID 1224 wrote to memory of 896 1224 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe PID 1224 wrote to memory of 896 1224 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe PID 1224 wrote to memory of 896 1224 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe PID 1224 wrote to memory of 896 1224 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe PID 1224 wrote to memory of 896 1224 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe PID 1224 wrote to memory of 896 1224 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe PID 1224 wrote to memory of 896 1224 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe -
outlook_win_path 1 IoCs
Processes:
9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe"C:\Users\Admin\AppData\Local\Temp\9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe"C:\Users\Admin\AppData\Local\Temp\9f61b044de1e7d10bf44dc6dfa319601f45d873d098a0d27add5044d0d66fb8f.exe"2⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/896-66-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/896-70-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/896-69-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/896-57-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/896-58-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/896-60-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/896-68-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/896-62-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/896-61-0x0000000000866F1E-mapping.dmp
-
memory/896-67-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/1224-63-0x0000000074F00000-0x00000000754AB000-memory.dmpFilesize
5.7MB
-
memory/1224-64-0x0000000000695000-0x0000000000698000-memory.dmpFilesize
12KB
-
memory/1224-54-0x0000000076711000-0x0000000076713000-memory.dmpFilesize
8KB
-
memory/1224-56-0x0000000000695000-0x0000000000698000-memory.dmpFilesize
12KB
-
memory/1224-55-0x0000000074F00000-0x00000000754AB000-memory.dmpFilesize
5.7MB