Analysis

  • max time kernel
    157s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 23:51

General

  • Target

    1bee3cea66bd66a0f3cb904f62b869d0.exe

  • Size

    116KB

  • MD5

    1bee3cea66bd66a0f3cb904f62b869d0

  • SHA1

    a3d6dfc2b70dbc0bddbb1d55e165e17c963cec52

  • SHA256

    a455e8692d017a220578feb1735d22df8ba6480321f64b3e5367bca8bca4ce41

  • SHA512

    48fd431db3350a82462f93aecba1ea181e1a0986e7ec5cfcbee1ef1d1e6ba93fa06d4d333784b5fd4b6cf5fc0a93b009676b8fac8e0975cd3176d5cce9ab8bfa

  • SSDEEP

    1536:UCNOwURjDIHTv6Ucb9LT0Ey2qeZPeFbfJixpyP0iM4lqUrt+eZIg5sHN10qly6p7:PNOccZT01ceS3ycVUrtXv+HTQXIZx

Malware Config

Extracted

Family

pony

C2

http://abes.co/forum/viewtopic.php

http://abes.net/forum/viewtopic.php

http://abesburger.com/forum/viewtopic.php

http://abescasualgrill.com/forum/viewtopic.php

Attributes
  • payload_url

    http://onlinepsychologymastersdegree.com/gzJYLFGh.exe

    http://drucker.v.pl/rmXx1Ddp.exe

    http://ftp.itele.sk/MGz.exe

    http://www.duracleanllc.com/y74r4g.exe

Signatures

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bee3cea66bd66a0f3cb904f62b869d0.exe
    "C:\Users\Admin\AppData\Local\Temp\1bee3cea66bd66a0f3cb904f62b869d0.exe"
    1⤵
    • Accesses Microsoft Outlook accounts
    • Accesses Microsoft Outlook profiles
    • Suspicious use of AdjustPrivilegeToken
    • outlook_win_path
    PID:4760

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4760-132-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/4760-133-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB