Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
3ec4593066236222bad584daa6b90ca307a6830e19fa5f36d6719629c32ddc24.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3ec4593066236222bad584daa6b90ca307a6830e19fa5f36d6719629c32ddc24.exe
Resource
win10v2004-20220812-en
General
-
Target
3ec4593066236222bad584daa6b90ca307a6830e19fa5f36d6719629c32ddc24.exe
-
Size
121KB
-
MD5
8edd479c3e730a7d9777675b788b6374
-
SHA1
b303a76176f2cc39d237588d5faa8e761fba040d
-
SHA256
3ec4593066236222bad584daa6b90ca307a6830e19fa5f36d6719629c32ddc24
-
SHA512
556c04a1f843e1be529bb983311ae0eeaa3f53f52c2df094e98ccf6c5961fc66d80b79709d3f9aeda2cc9362637f08a4ee09dcf8a880738798a90fdf84def3b8
-
SSDEEP
3072:1IPJhWEK+C/CDSamHplh8aGv6Heawnh06:2PJqB2SDQfbT0
Malware Config
Extracted
pony
http://rockims.com/forum/viewtopic.php
http://swingingwiththefinkelsthemovie.com/forum/viewtopic.php
http://taxipunjab.com/forum/viewtopic.php
http://taxisamritsar.com/forum/viewtopic.php
-
payload_url
http://voipphoneconsulting.com/WaT6.exe
http://pcnetoffice.com/5rLVqGz.exe
http://903-entertainment.com/u6aj9scw.exe
http://leakdetecta.com/vT5kP.exe
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 3ec4593066236222bad584daa6b90ca307a6830e19fa5f36d6719629c32ddc24.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 3ec4593066236222bad584daa6b90ca307a6830e19fa5f36d6719629c32ddc24.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 1692 3ec4593066236222bad584daa6b90ca307a6830e19fa5f36d6719629c32ddc24.exe Token: SeTcbPrivilege 1692 3ec4593066236222bad584daa6b90ca307a6830e19fa5f36d6719629c32ddc24.exe Token: SeChangeNotifyPrivilege 1692 3ec4593066236222bad584daa6b90ca307a6830e19fa5f36d6719629c32ddc24.exe Token: SeCreateTokenPrivilege 1692 3ec4593066236222bad584daa6b90ca307a6830e19fa5f36d6719629c32ddc24.exe Token: SeBackupPrivilege 1692 3ec4593066236222bad584daa6b90ca307a6830e19fa5f36d6719629c32ddc24.exe Token: SeRestorePrivilege 1692 3ec4593066236222bad584daa6b90ca307a6830e19fa5f36d6719629c32ddc24.exe Token: SeIncreaseQuotaPrivilege 1692 3ec4593066236222bad584daa6b90ca307a6830e19fa5f36d6719629c32ddc24.exe Token: SeAssignPrimaryTokenPrivilege 1692 3ec4593066236222bad584daa6b90ca307a6830e19fa5f36d6719629c32ddc24.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 3ec4593066236222bad584daa6b90ca307a6830e19fa5f36d6719629c32ddc24.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ec4593066236222bad584daa6b90ca307a6830e19fa5f36d6719629c32ddc24.exe"C:\Users\Admin\AppData\Local\Temp\3ec4593066236222bad584daa6b90ca307a6830e19fa5f36d6719629c32ddc24.exe"1⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
PID:1692