Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-04-2023 22:34

General

  • Target

    05aa77273fbe5efb245560f519cddded.exe

  • Size

    114KB

  • MD5

    05aa77273fbe5efb245560f519cddded

  • SHA1

    15ad11fb49503dbd6c0d2f793532dab50a9d228c

  • SHA256

    f3b60b9fb81de5df1dad130e2f384654f4cfc532bfe38f9719b6e43647334dc4

  • SHA512

    627292a4a6dc29757023900f8cc3ff3fd103b36b4c913d764d58384e1d9358026d3bd7e0bc1be85f933f44740345c1d1c7190ce6dd46084b36b77472bbbe41ba

  • SSDEEP

    3072:eaGd0JWGpj28eQ/KR2i6hPPGf9fdLi7Ulq0SN:Y0JWGlpeQiR2fPSfdNlq00

Malware Config

Extracted

Family

pony

C2

http://abes.net/forum/viewtopic.php

http://abesburger.com/forum/viewtopic.php

http://abescasualgrill.com/forum/viewtopic.php

http://abescasualgrill.info/forum/viewtopic.php

Attributes
  • payload_url

    http://198.101.252.154/Hq6Te.exe

    http://cherishca.com/YJb7m.exe

    http://184.168.111.184/w1aN.exe

    http://ftp.petrasolutions.com/yETP3UsR.exe

Signatures

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05aa77273fbe5efb245560f519cddded.exe
    "C:\Users\Admin\AppData\Local\Temp\05aa77273fbe5efb245560f519cddded.exe"
    1⤵
    • Accesses Microsoft Outlook accounts
    • Accesses Microsoft Outlook profiles
    • Suspicious use of AdjustPrivilegeToken
    • outlook_win_path
    PID:4112

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4112-133-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB

  • memory/4112-134-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB

  • memory/4112-135-0x0000000000A00000-0x0000000000A01000-memory.dmp
    Filesize

    4KB

  • memory/4112-136-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB