Analysis

  • max time kernel
    139s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 10:56

General

  • Target

    27d85a395aef2dbd3bd3406a96651a4602483ab1a0cf8c95def0007742ccb754.exe

  • Size

    287KB

  • MD5

    043561f1837fae197aea41280e0e6350

  • SHA1

    04db1bbf34a8ba926e430de6f447066707b66fd8

  • SHA256

    27d85a395aef2dbd3bd3406a96651a4602483ab1a0cf8c95def0007742ccb754

  • SHA512

    2cbc2eb024869eb6e636ffd5eed0f2dc7259c0adaef1e56862d52040d6723764dc24b3d10d1aa8d4ae7fb7d4eb4bd6d0a19fc790dadd3d43c9293500833e5913

  • SSDEEP

    6144:HYdTOd+1ig3XO+UVLJrhwQns3879dj1Ur8RoD3tKXw:HYdKd+1RgVLxdj1UwRhXw

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 57 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of FindShellTrayWindow 53 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27d85a395aef2dbd3bd3406a96651a4602483ab1a0cf8c95def0007742ccb754.exe
    "C:\Users\Admin\AppData\Local\Temp\27d85a395aef2dbd3bd3406a96651a4602483ab1a0cf8c95def0007742ccb754.exe"
    1⤵
    • Modifies security service
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4260
    • C:\Users\Admin\AppData\Local\Temp\27d85a395aef2dbd3bd3406a96651a4602483ab1a0cf8c95def0007742ccb754.exe
      C:\Users\Admin\AppData\Local\Temp\27d85a395aef2dbd3bd3406a96651a4602483ab1a0cf8c95def0007742ccb754.exe startC:\Users\Admin\AppData\Roaming\AE1F1\FE361.exe%C:\Users\Admin\AppData\Roaming\AE1F1
      2⤵
        PID:4592
      • C:\Users\Admin\AppData\Local\Temp\27d85a395aef2dbd3bd3406a96651a4602483ab1a0cf8c95def0007742ccb754.exe
        C:\Users\Admin\AppData\Local\Temp\27d85a395aef2dbd3bd3406a96651a4602483ab1a0cf8c95def0007742ccb754.exe startC:\Program Files (x86)\F1BFF\lvvm.exe%C:\Program Files (x86)\F1BFF
        2⤵
          PID:3224
        • C:\Program Files (x86)\LP\618A\3F89.tmp
          "C:\Program Files (x86)\LP\618A\3F89.tmp"
          2⤵
          • Executes dropped EXE
          PID:176
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4924
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:2076
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3776
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Enumerates system info in registry
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1116

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\LP\618A\3F89.tmp

        Filesize

        102KB

        MD5

        a41925371a3d19c41fb25641d0a0df50

        SHA1

        ecd36f0614698521ecf39eebca91ef139539b1fb

        SHA256

        00c2f913943948ed58458208f38fbd64c86b3e82e62f9f09bf01507d6edb1a29

        SHA512

        23d2ec4ea266612026b5ef629e672dd0a3991e144d420ced8aea23d028727fdd040f6fb14667098053b598ed34469f211ac855d8aac961cd771369aad12ba8e8

      • C:\Program Files (x86)\LP\618A\3F89.tmp

        Filesize

        102KB

        MD5

        a41925371a3d19c41fb25641d0a0df50

        SHA1

        ecd36f0614698521ecf39eebca91ef139539b1fb

        SHA256

        00c2f913943948ed58458208f38fbd64c86b3e82e62f9f09bf01507d6edb1a29

        SHA512

        23d2ec4ea266612026b5ef629e672dd0a3991e144d420ced8aea23d028727fdd040f6fb14667098053b598ed34469f211ac855d8aac961cd771369aad12ba8e8

      • memory/176-157-0x000000000066E000-0x000000000067E000-memory.dmp

        Filesize

        64KB

      • memory/176-156-0x0000000000400000-0x000000000041D000-memory.dmp

        Filesize

        116KB

      • memory/176-155-0x000000000066E000-0x000000000067E000-memory.dmp

        Filesize

        64KB

      • memory/176-154-0x0000000000400000-0x000000000041D000-memory.dmp

        Filesize

        116KB

      • memory/1116-169-0x000001B5096E0000-0x000001B509700000-memory.dmp

        Filesize

        128KB

      • memory/1116-271-0x000001B509520000-0x000001B509540000-memory.dmp

        Filesize

        128KB

      • memory/1116-296-0x000001B509785000-0x000001B509788000-memory.dmp

        Filesize

        12KB

      • memory/1116-295-0x000001B509785000-0x000001B509788000-memory.dmp

        Filesize

        12KB

      • memory/1116-293-0x000001B509785000-0x000001B509788000-memory.dmp

        Filesize

        12KB

      • memory/1116-294-0x000001B509785000-0x000001B509788000-memory.dmp

        Filesize

        12KB

      • memory/1116-182-0x000001B519C20000-0x000001B519C40000-memory.dmp

        Filesize

        128KB

      • memory/1116-165-0x000001B519780000-0x000001B519880000-memory.dmp

        Filesize

        1024KB

      • memory/1116-161-0x000001B509720000-0x000001B509740000-memory.dmp

        Filesize

        128KB

      • memory/1116-158-0x000001B504E90000-0x000001B504E98000-memory.dmp

        Filesize

        32KB

      • memory/3224-141-0x0000000000400000-0x000000000046C000-memory.dmp

        Filesize

        432KB

      • memory/3224-142-0x00000000005C4000-0x000000000060C000-memory.dmp

        Filesize

        288KB

      • memory/4260-133-0x0000000000400000-0x000000000046C000-memory.dmp

        Filesize

        432KB

      • memory/4260-134-0x00000000006D0000-0x0000000000718000-memory.dmp

        Filesize

        288KB

      • memory/4260-135-0x0000000000400000-0x000000000046C000-memory.dmp

        Filesize

        432KB

      • memory/4260-132-0x00000000006D0000-0x0000000000718000-memory.dmp

        Filesize

        288KB

      • memory/4592-137-0x0000000000664000-0x00000000006AC000-memory.dmp

        Filesize

        288KB

      • memory/4592-138-0x0000000000400000-0x000000000046C000-memory.dmp

        Filesize

        432KB

      • memory/4592-139-0x0000000000664000-0x00000000006AC000-memory.dmp

        Filesize

        288KB