Analysis

  • max time kernel
    28s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02/05/2023, 00:06

General

  • Target

    C01DABDB1E0572151396954FD7BCD7334CEE5B1D64DE2.exe

  • Size

    1.3MB

  • MD5

    a547e64045d30568aa7e3afd81b81594

  • SHA1

    9806c99c6f77be88be0629a3c851e6002a5a0d05

  • SHA256

    c01dabdb1e0572151396954fd7bcd7334cee5b1d64de29b7de21c14eafbd6416

  • SHA512

    6d7bf8a3d7126312bd886319530f1576dfa1a98cdc3f71282b313b8854f5ea27a677d3b6c8cfdd4a7ee5260c21783c9f48cf2522002ad06b2de714e7eee89a02

  • SSDEEP

    24576:rKPJPQ9i31L+VU7mqcZDvO78A649Po0Gb2rIbJpmZ/+fudAZRVG51iKZEUbr//eJ:rKxn3F7s9v46MhLIbJUZ/+fuyZR4/JPc

Malware Config

Extracted

Family

pony

C2

http://maxesupport.com/bless/gate.php

Signatures

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 4 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 4 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\C01DABDB1E0572151396954FD7BCD7334CEE5B1D64DE2.exe
    "C:\Users\Admin\AppData\Local\Temp\C01DABDB1E0572151396954FD7BCD7334CEE5B1D64DE2.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GVALQC~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GVALQC~1.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Users\Admin\AppData\Roaming\fEKI.exe
        "C:\Users\Admin\AppData\Roaming\fEKI.exe" "C:\Users\Admin\AppData\Roaming\ZSbPN"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:464
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          4⤵
            PID:328
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
            • Accesses Microsoft Outlook accounts
            • Accesses Microsoft Outlook profiles
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:892
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\7113926.bat" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" "
              5⤵
                PID:1424
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
              4⤵
              • Accesses Microsoft Outlook accounts
              • Accesses Microsoft Outlook profiles
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1536
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\7115704.bat" "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe" "
                5⤵
                  PID:1240
              • C:\Windows\SysWOW64\wscript.exe
                "C:\Windows\SysWOW64\wscript.exe"
                4⤵
                • Accesses Microsoft Outlook accounts
                • Accesses Microsoft Outlook profiles
                • Suspicious use of WriteProcessMemory
                PID:1880
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\7117530.bat" "C:\Windows\SysWOW64\wscript.exe" "
                  5⤵
                    PID:556
                • C:\Windows\SysWOW64\wscript.exe
                  "C:\Windows\SysWOW64\wscript.exe"
                  4⤵
                  • Accesses Microsoft Outlook accounts
                  • Accesses Microsoft Outlook profiles
                  • outlook_win_path
                  PID:344
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\7118996.bat" "C:\Windows\SysWOW64\wscript.exe" "
                    5⤵
                      PID:688

            Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\7113926.bat

                    Filesize

                    94B

                    MD5

                    3880eeb1c736d853eb13b44898b718ab

                    SHA1

                    4eec9d50360cd815211e3c4e6bdd08271b6ec8e6

                    SHA256

                    936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7

                    SHA512

                    3eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b

                  • C:\Users\Admin\AppData\Local\Temp\7113926.bat

                    Filesize

                    94B

                    MD5

                    3880eeb1c736d853eb13b44898b718ab

                    SHA1

                    4eec9d50360cd815211e3c4e6bdd08271b6ec8e6

                    SHA256

                    936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7

                    SHA512

                    3eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b

                  • C:\Users\Admin\AppData\Local\Temp\7115704.bat

                    Filesize

                    94B

                    MD5

                    3880eeb1c736d853eb13b44898b718ab

                    SHA1

                    4eec9d50360cd815211e3c4e6bdd08271b6ec8e6

                    SHA256

                    936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7

                    SHA512

                    3eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b

                  • C:\Users\Admin\AppData\Local\Temp\7117530.bat

                    Filesize

                    94B

                    MD5

                    3880eeb1c736d853eb13b44898b718ab

                    SHA1

                    4eec9d50360cd815211e3c4e6bdd08271b6ec8e6

                    SHA256

                    936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7

                    SHA512

                    3eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b

                  • C:\Users\Admin\AppData\Local\Temp\7118996.bat

                    Filesize

                    94B

                    MD5

                    3880eeb1c736d853eb13b44898b718ab

                    SHA1

                    4eec9d50360cd815211e3c4e6bdd08271b6ec8e6

                    SHA256

                    936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7

                    SHA512

                    3eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GVALQC~1.EXE

                    Filesize

                    1.5MB

                    MD5

                    358d759171a9f0da115c2a81cc9a2833

                    SHA1

                    a88fa8db32eaa5c3eca34b6c4fb480ecba13689d

                    SHA256

                    9a6faf9a3ef2e705abd3f284ff6deda392a7ad1e66f2214a7ee07e19eead0af2

                    SHA512

                    0eb48799fd59d83cbfe0d0f5ab6302efd953fd146ee09cd890b66f90458f756f703c8792a97fc773fd2c75700e1ffd9bff4b9495a5fd48beb65fd09422d95f84

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GVALQC~1.EXE

                    Filesize

                    1.5MB

                    MD5

                    358d759171a9f0da115c2a81cc9a2833

                    SHA1

                    a88fa8db32eaa5c3eca34b6c4fb480ecba13689d

                    SHA256

                    9a6faf9a3ef2e705abd3f284ff6deda392a7ad1e66f2214a7ee07e19eead0af2

                    SHA512

                    0eb48799fd59d83cbfe0d0f5ab6302efd953fd146ee09cd890b66f90458f756f703c8792a97fc773fd2c75700e1ffd9bff4b9495a5fd48beb65fd09422d95f84

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZSbPN

                    Filesize

                    186KB

                    MD5

                    514d4e6cc207fb321467fd3ddb6ae93a

                    SHA1

                    fcf9f8d1d69ccdb06108e454e76884297fde6fc2

                    SHA256

                    7300b6db420ba1c9b2bb22bfd0fff91910d7ec8f66720a6a21a2dff96a9f32e7

                    SHA512

                    57fc890726f1bdd536552a08ae29f43632ae68dff60caa5a11f989fa02c170006196e282dc006a6c255f944a082284c6efbee2d0df6ca37645543a2d6dc6e3b5

                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fEKI.exe

                    Filesize

                    915KB

                    MD5

                    b06e67f9767e5023892d9698703ad098

                    SHA1

                    acc07666f4c1d4461d3e1c263cf6a194a8dd1544

                    SHA256

                    8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

                    SHA512

                    7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

                  • C:\Users\Admin\AppData\Roaming\ZSbPN

                    Filesize

                    140KB

                    MD5

                    55e1225df75cf2c505656a70d994023d

                    SHA1

                    21cdae71eda791d607532262d97841eef097e71c

                    SHA256

                    8031fd75799c001d511bb0a80148ec85d3d30c83c2f29fce2703f5330237eb48

                    SHA512

                    6ccc47f8dbb2e92f4a3246032f0c6beb1fa54153eb061598ca1a274f51d86e87a32ae224480f6fc51893a82ea52f344ad6d13ad6c99ee5c2774eb5f1648a8eff

                  • C:\Users\Admin\AppData\Roaming\fEKI.exe

                    Filesize

                    915KB

                    MD5

                    b06e67f9767e5023892d9698703ad098

                    SHA1

                    acc07666f4c1d4461d3e1c263cf6a194a8dd1544

                    SHA256

                    8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

                    SHA512

                    7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

                  • C:\Users\Admin\AppData\Roaming\fEKI.exe

                    Filesize

                    915KB

                    MD5

                    b06e67f9767e5023892d9698703ad098

                    SHA1

                    acc07666f4c1d4461d3e1c263cf6a194a8dd1544

                    SHA256

                    8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

                    SHA512

                    7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

                  • C:\Users\Admin\AppData\Roaming\fEKI.exe

                    Filesize

                    915KB

                    MD5

                    b06e67f9767e5023892d9698703ad098

                    SHA1

                    acc07666f4c1d4461d3e1c263cf6a194a8dd1544

                    SHA256

                    8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

                    SHA512

                    7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\GVALQC~1.EXE

                    Filesize

                    1.5MB

                    MD5

                    358d759171a9f0da115c2a81cc9a2833

                    SHA1

                    a88fa8db32eaa5c3eca34b6c4fb480ecba13689d

                    SHA256

                    9a6faf9a3ef2e705abd3f284ff6deda392a7ad1e66f2214a7ee07e19eead0af2

                    SHA512

                    0eb48799fd59d83cbfe0d0f5ab6302efd953fd146ee09cd890b66f90458f756f703c8792a97fc773fd2c75700e1ffd9bff4b9495a5fd48beb65fd09422d95f84

                  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\GVALQC~1.EXE

                    Filesize

                    1.5MB

                    MD5

                    358d759171a9f0da115c2a81cc9a2833

                    SHA1

                    a88fa8db32eaa5c3eca34b6c4fb480ecba13689d

                    SHA256

                    9a6faf9a3ef2e705abd3f284ff6deda392a7ad1e66f2214a7ee07e19eead0af2

                    SHA512

                    0eb48799fd59d83cbfe0d0f5ab6302efd953fd146ee09cd890b66f90458f756f703c8792a97fc773fd2c75700e1ffd9bff4b9495a5fd48beb65fd09422d95f84

                  • \Users\Admin\AppData\Roaming\fEKI.exe

                    Filesize

                    915KB

                    MD5

                    b06e67f9767e5023892d9698703ad098

                    SHA1

                    acc07666f4c1d4461d3e1c263cf6a194a8dd1544

                    SHA256

                    8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

                    SHA512

                    7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

                  • \Users\Admin\AppData\Roaming\fEKI.exe

                    Filesize

                    915KB

                    MD5

                    b06e67f9767e5023892d9698703ad098

                    SHA1

                    acc07666f4c1d4461d3e1c263cf6a194a8dd1544

                    SHA256

                    8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

                    SHA512

                    7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

                  • memory/344-138-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/892-87-0x0000000000400000-0x0000000000419000-memory.dmp

                    Filesize

                    100KB

                  • memory/892-101-0x0000000000400000-0x0000000000419000-memory.dmp

                    Filesize

                    100KB

                  • memory/892-92-0x0000000000400000-0x0000000000419000-memory.dmp

                    Filesize

                    100KB

                  • memory/892-89-0x0000000000400000-0x0000000000419000-memory.dmp

                    Filesize

                    100KB

                  • memory/892-86-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/892-85-0x0000000000400000-0x0000000000419000-memory.dmp

                    Filesize

                    100KB

                  • memory/1536-104-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/1536-109-0x0000000000400000-0x0000000000419000-memory.dmp

                    Filesize

                    100KB

                  • memory/1536-118-0x0000000000400000-0x0000000000419000-memory.dmp

                    Filesize

                    100KB

                  • memory/1880-121-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/1880-126-0x0000000000400000-0x0000000000419000-memory.dmp

                    Filesize

                    100KB

                  • memory/1880-135-0x0000000000400000-0x0000000000419000-memory.dmp

                    Filesize

                    100KB