Analysis

  • max time kernel
    233s
  • max time network
    333s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 12:10

General

  • Target

    a1f12c346b487f5054ca918323fbada1aad97bd46dedb5ff5ff75d7bb34b0fde.jar

  • Size

    147KB

  • MD5

    84fb7ae55623298b8e648ff5c7dc2115

  • SHA1

    1af05edd024bf064f1d03c640ab6a09b3a3f0d7c

  • SHA256

    a1f12c346b487f5054ca918323fbada1aad97bd46dedb5ff5ff75d7bb34b0fde

  • SHA512

    401f0e31489404d494a1a7068866a43fd981a5bbc5698c816d970596d05a8c032c773db8103b63178797dab121b166797e8ca2502bdc72c3e7afcc5a74e9d00e

  • SSDEEP

    3072:ASXpIshi44JexXmSKpPULrtYnqAOUkiQKjh4YmTmLbb58Kdz+CmmCrUk:PIEiPhSUPUqqA9jtSCLbqKRrm94k

Malware Config

Extracted

Family

pony

C2

http://sweet0rium.com/dd/Panel/gate.php

http://www.sweet0rium.com/dd/Panel/gate.php

Signatures

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 3 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\a1f12c346b487f5054ca918323fbada1aad97bd46dedb5ff5ff75d7bb34b0fde.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Windows\system32\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\asdqw67728263020026206530INVOICES.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1084
      • C:\Users\Admin\AppData\Local\Temp\asdqw67728263020026206530INVOICES.exe
        C:\Users\Admin\AppData\Local\Temp\asdqw67728263020026206530INVOICES.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Maps connected drives based on registry
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:884
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "ggg" /t REG_SZ /d "C:\ProgramData\Find.exe" & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:864
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "ggg" /t REG_SZ /d "C:\ProgramData\Find.exe"
            5⤵
            • Adds Run key to start application
            PID:924
        • C:\ProgramData\Find.exe
          "C:\ProgramData\Find.exe"
          4⤵
          • Executes dropped EXE
          • Maps connected drives based on registry
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1132
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"
            5⤵
            • Accesses Microsoft Outlook accounts
            • Accesses Microsoft Outlook profiles
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • outlook_win_path
            PID:1704
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\7369705.bat" "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" "
              6⤵
                PID:1740

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Collection

    Email Collection

    2
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Find.exe
      Filesize

      165KB

      MD5

      ddfeb9dd1daa1c89a2a2054dfadabd86

      SHA1

      3fd8ad5d2a01d238027440d257abecb3e275a2cd

      SHA256

      ac8c02ae07d639de97b9fb9a1c45506d9e66aa637c68a191bd5ea6a3840689d7

      SHA512

      4928340e39a38f78bb91ab7907cbfad71211f4286ff0123361994d2f542a4633ff7a417b78dc24d7744225813850f457fdfc2cffc8032053077fc6c757f6908f

    • C:\Users\Admin\AppData\Local\Temp\7369705.bat
      Filesize

      94B

      MD5

      3880eeb1c736d853eb13b44898b718ab

      SHA1

      4eec9d50360cd815211e3c4e6bdd08271b6ec8e6

      SHA256

      936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7

      SHA512

      3eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b

    • C:\Users\Admin\AppData\Local\Temp\asdqw67728263020026206530INVOICES.exe
      Filesize

      165KB

      MD5

      ddfeb9dd1daa1c89a2a2054dfadabd86

      SHA1

      3fd8ad5d2a01d238027440d257abecb3e275a2cd

      SHA256

      ac8c02ae07d639de97b9fb9a1c45506d9e66aa637c68a191bd5ea6a3840689d7

      SHA512

      4928340e39a38f78bb91ab7907cbfad71211f4286ff0123361994d2f542a4633ff7a417b78dc24d7744225813850f457fdfc2cffc8032053077fc6c757f6908f

    • C:\Users\Admin\AppData\Local\Temp\asdqw67728263020026206530INVOICES.exe
      Filesize

      165KB

      MD5

      ddfeb9dd1daa1c89a2a2054dfadabd86

      SHA1

      3fd8ad5d2a01d238027440d257abecb3e275a2cd

      SHA256

      ac8c02ae07d639de97b9fb9a1c45506d9e66aa637c68a191bd5ea6a3840689d7

      SHA512

      4928340e39a38f78bb91ab7907cbfad71211f4286ff0123361994d2f542a4633ff7a417b78dc24d7744225813850f457fdfc2cffc8032053077fc6c757f6908f

    • \Users\Admin\AppData\Local\Temp\asdqw67728263020026206530INVOICES.exe
      Filesize

      165KB

      MD5

      ddfeb9dd1daa1c89a2a2054dfadabd86

      SHA1

      3fd8ad5d2a01d238027440d257abecb3e275a2cd

      SHA256

      ac8c02ae07d639de97b9fb9a1c45506d9e66aa637c68a191bd5ea6a3840689d7

      SHA512

      4928340e39a38f78bb91ab7907cbfad71211f4286ff0123361994d2f542a4633ff7a417b78dc24d7744225813850f457fdfc2cffc8032053077fc6c757f6908f

    • \Users\Admin\AppData\Local\Temp\asdqw67728263020026206530INVOICES.exe
      Filesize

      165KB

      MD5

      ddfeb9dd1daa1c89a2a2054dfadabd86

      SHA1

      3fd8ad5d2a01d238027440d257abecb3e275a2cd

      SHA256

      ac8c02ae07d639de97b9fb9a1c45506d9e66aa637c68a191bd5ea6a3840689d7

      SHA512

      4928340e39a38f78bb91ab7907cbfad71211f4286ff0123361994d2f542a4633ff7a417b78dc24d7744225813850f457fdfc2cffc8032053077fc6c757f6908f

    • \Users\Admin\AppData\Local\Temp\asdqw67728263020026206530INVOICES.exe
      Filesize

      165KB

      MD5

      ddfeb9dd1daa1c89a2a2054dfadabd86

      SHA1

      3fd8ad5d2a01d238027440d257abecb3e275a2cd

      SHA256

      ac8c02ae07d639de97b9fb9a1c45506d9e66aa637c68a191bd5ea6a3840689d7

      SHA512

      4928340e39a38f78bb91ab7907cbfad71211f4286ff0123361994d2f542a4633ff7a417b78dc24d7744225813850f457fdfc2cffc8032053077fc6c757f6908f

    • memory/864-80-0x0000000000000000-mapping.dmp
    • memory/884-85-0x0000000072E10000-0x00000000733BB000-memory.dmp
      Filesize

      5.7MB

    • memory/884-74-0x00000000753F1000-0x00000000753F3000-memory.dmp
      Filesize

      8KB

    • memory/884-72-0x0000000000000000-mapping.dmp
    • memory/884-78-0x0000000072E10000-0x00000000733BB000-memory.dmp
      Filesize

      5.7MB

    • memory/884-79-0x0000000072E10000-0x00000000733BB000-memory.dmp
      Filesize

      5.7MB

    • memory/924-86-0x0000000000000000-mapping.dmp
    • memory/1084-69-0x0000000000000000-mapping.dmp
    • memory/1132-81-0x0000000000000000-mapping.dmp
    • memory/1132-88-0x0000000072860000-0x0000000072E0B000-memory.dmp
      Filesize

      5.7MB

    • memory/1132-101-0x0000000072860000-0x0000000072E0B000-memory.dmp
      Filesize

      5.7MB

    • memory/1160-68-0x0000000002220000-0x0000000005220000-memory.dmp
      Filesize

      48.0MB

    • memory/1160-54-0x000007FEFB651000-0x000007FEFB653000-memory.dmp
      Filesize

      8KB

    • memory/1160-64-0x0000000002220000-0x0000000005220000-memory.dmp
      Filesize

      48.0MB

    • memory/1704-92-0x0000000000400000-0x000000000041D000-memory.dmp
      Filesize

      116KB

    • memory/1704-93-0x0000000000400000-0x000000000041D000-memory.dmp
      Filesize

      116KB

    • memory/1704-94-0x000000000041AF70-mapping.dmp
    • memory/1704-96-0x0000000000400000-0x000000000041D000-memory.dmp
      Filesize

      116KB

    • memory/1704-99-0x0000000000400000-0x000000000041D000-memory.dmp
      Filesize

      116KB

    • memory/1704-90-0x0000000000400000-0x000000000041D000-memory.dmp
      Filesize

      116KB

    • memory/1704-100-0x0000000000400000-0x000000000041D000-memory.dmp
      Filesize

      116KB

    • memory/1704-102-0x0000000000400000-0x000000000041D000-memory.dmp
      Filesize

      116KB

    • memory/1704-103-0x0000000000400000-0x000000000041D000-memory.dmp
      Filesize

      116KB

    • memory/1704-105-0x0000000000400000-0x000000000041D000-memory.dmp
      Filesize

      116KB

    • memory/1704-89-0x0000000000400000-0x000000000041D000-memory.dmp
      Filesize

      116KB

    • memory/1740-104-0x0000000000000000-mapping.dmp