Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 06:28

General

  • Target

    f7e0be23dca48234c7b7e7c51f5f6804acde1fe35d2a7a000e4b039136974993.exe

  • Size

    286KB

  • MD5

    ba6a7f3b7bfd7a19ce8c6681a39f8d03

  • SHA1

    bed2321075691275f2ed1c1013df8d97b4f4f24d

  • SHA256

    f7e0be23dca48234c7b7e7c51f5f6804acde1fe35d2a7a000e4b039136974993

  • SHA512

    95f4bd9c638384500d18ae235b403204cf49206d9607e94b6b2ac3e8f57ea57d8431ac937d8a2953e118544532e87a6dd5e29f71f39c698ae708be2ed7028f8c

  • SSDEEP

    6144:D8wWPQ7f8c/49sl4NTZ9doS8xcmZt/7Ef2aoEAPFdwV:gro8/hNTRN8/42SVV

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 53 IoCs
  • Suspicious use of SendNotifyMessage 25 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7e0be23dca48234c7b7e7c51f5f6804acde1fe35d2a7a000e4b039136974993.exe
    "C:\Users\Admin\AppData\Local\Temp\f7e0be23dca48234c7b7e7c51f5f6804acde1fe35d2a7a000e4b039136974993.exe"
    1⤵
    • Modifies security service
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3044
    • C:\Users\Admin\AppData\Local\Temp\f7e0be23dca48234c7b7e7c51f5f6804acde1fe35d2a7a000e4b039136974993.exe
      C:\Users\Admin\AppData\Local\Temp\f7e0be23dca48234c7b7e7c51f5f6804acde1fe35d2a7a000e4b039136974993.exe startC:\Users\Admin\AppData\Roaming\403A9\AD51D.exe%C:\Users\Admin\AppData\Roaming\403A9
      2⤵
        PID:2788
      • C:\Program Files (x86)\LP\1D04\78F9.tmp
        "C:\Program Files (x86)\LP\1D04\78F9.tmp"
        2⤵
        • Executes dropped EXE
        PID:3900
      • C:\Users\Admin\AppData\Local\Temp\f7e0be23dca48234c7b7e7c51f5f6804acde1fe35d2a7a000e4b039136974993.exe
        C:\Users\Admin\AppData\Local\Temp\f7e0be23dca48234c7b7e7c51f5f6804acde1fe35d2a7a000e4b039136974993.exe startC:\Program Files (x86)\A9248\lvvm.exe%C:\Program Files (x86)\A9248
        2⤵
          PID:2984
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1372
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:4232
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Enumerates system info in registry
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1452
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2000

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\LP\1D04\78F9.tmp

        Filesize

        101KB

        MD5

        debb2016f85b326c4b77fbedd9718e10

        SHA1

        27c4366a0b61240d1cb6ceec6901a77f085d96e9

        SHA256

        d45a36a5503f09a0c5e808289a5ce61549b678339163cbfc7ddb6b646e1354f0

        SHA512

        6230c1ca879f5fa22d7982ff2d1795f8fcd85e9c3e8ac400474f0b8084f8530e417f62e8cf20f41f865a86c3acaa48d3e872b087729112dd2ae0e3c78890ecab

      • C:\Program Files (x86)\LP\1D04\78F9.tmp

        Filesize

        101KB

        MD5

        debb2016f85b326c4b77fbedd9718e10

        SHA1

        27c4366a0b61240d1cb6ceec6901a77f085d96e9

        SHA256

        d45a36a5503f09a0c5e808289a5ce61549b678339163cbfc7ddb6b646e1354f0

        SHA512

        6230c1ca879f5fa22d7982ff2d1795f8fcd85e9c3e8ac400474f0b8084f8530e417f62e8cf20f41f865a86c3acaa48d3e872b087729112dd2ae0e3c78890ecab

      • memory/1452-155-0x000002F44E470000-0x000002F44E490000-memory.dmp

        Filesize

        128KB

      • memory/1452-253-0x000002F44D0B0000-0x000002F44D0D0000-memory.dmp

        Filesize

        128KB

      • memory/1452-252-0x000002F44E270000-0x000002F44E290000-memory.dmp

        Filesize

        128KB

      • memory/1452-162-0x000002F44E2B0000-0x000002F44E2D0000-memory.dmp

        Filesize

        128KB

      • memory/1452-159-0x000002F45E4F0000-0x000002F45E5F0000-memory.dmp

        Filesize

        1024KB

      • memory/1452-153-0x000002F44D1A0000-0x000002F44D1A8000-memory.dmp

        Filesize

        32KB

      • memory/2788-138-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2788-139-0x0000000000565000-0x00000000005AB000-memory.dmp

        Filesize

        280KB

      • memory/2984-145-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/3044-132-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/3044-133-0x00000000004C2000-0x0000000000508000-memory.dmp

        Filesize

        280KB

      • memory/3900-144-0x0000000000770000-0x000000000077F000-memory.dmp

        Filesize

        60KB

      • memory/3900-143-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/3900-141-0x0000000000770000-0x000000000077F000-memory.dmp

        Filesize

        60KB

      • memory/3900-140-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB