Analysis

  • max time kernel
    118s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 19:23

General

  • Target

    C01DABDB1E0572151396954FD7BCD7334CEE5B1D64DE2.exe

  • Size

    1.3MB

  • MD5

    a547e64045d30568aa7e3afd81b81594

  • SHA1

    9806c99c6f77be88be0629a3c851e6002a5a0d05

  • SHA256

    c01dabdb1e0572151396954fd7bcd7334cee5b1d64de29b7de21c14eafbd6416

  • SHA512

    6d7bf8a3d7126312bd886319530f1576dfa1a98cdc3f71282b313b8854f5ea27a677d3b6c8cfdd4a7ee5260c21783c9f48cf2522002ad06b2de714e7eee89a02

  • SSDEEP

    24576:rKPJPQ9i31L+VU7mqcZDvO78A649Po0Gb2rIbJpmZ/+fudAZRVG51iKZEUbr//eJ:rKxn3F7s9v46MhLIbJUZ/+fuyZR4/JPc

Malware Config

Extracted

Family

pony

C2

http://maxesupport.com/bless/gate.php

Signatures

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 3 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 4 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\C01DABDB1E0572151396954FD7BCD7334CEE5B1D64DE2.exe
    "C:\Users\Admin\AppData\Local\Temp\C01DABDB1E0572151396954FD7BCD7334CEE5B1D64DE2.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GVALQC~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GVALQC~1.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1156
      • C:\Users\Admin\AppData\Roaming\fEKI.exe
        "C:\Users\Admin\AppData\Roaming\fEKI.exe" "C:\Users\Admin\AppData\Roaming\ZSbPN"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1896
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          4⤵
          • Accesses Microsoft Outlook accounts
          • Accesses Microsoft Outlook profiles
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:280
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\7199227.bat" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" "
            5⤵
              PID:1464
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
            4⤵
            • Accesses Microsoft Outlook accounts
            • Accesses Microsoft Outlook profiles
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1124
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\7200413.bat" "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe" "
              5⤵
                PID:1136
            • C:\Windows\SysWOW64\wscript.exe
              "C:\Windows\SysWOW64\wscript.exe"
              4⤵
              • Accesses Microsoft Outlook accounts
              • Accesses Microsoft Outlook profiles
              • Suspicious use of WriteProcessMemory
              • outlook_win_path
              PID:904
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\7202347.bat" "C:\Windows\SysWOW64\wscript.exe" "
                5⤵
                  PID:1592

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        1
        T1112

        Credential Access

        Credentials in Files

        2
        T1081

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        1
        T1082

        Collection

        Data from Local System

        2
        T1005

        Email Collection

        2
        T1114

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7199227.bat
          Filesize

          94B

          MD5

          3880eeb1c736d853eb13b44898b718ab

          SHA1

          4eec9d50360cd815211e3c4e6bdd08271b6ec8e6

          SHA256

          936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7

          SHA512

          3eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b

        • C:\Users\Admin\AppData\Local\Temp\7199227.bat
          Filesize

          94B

          MD5

          3880eeb1c736d853eb13b44898b718ab

          SHA1

          4eec9d50360cd815211e3c4e6bdd08271b6ec8e6

          SHA256

          936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7

          SHA512

          3eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b

        • C:\Users\Admin\AppData\Local\Temp\7200413.bat
          Filesize

          94B

          MD5

          3880eeb1c736d853eb13b44898b718ab

          SHA1

          4eec9d50360cd815211e3c4e6bdd08271b6ec8e6

          SHA256

          936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7

          SHA512

          3eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b

        • C:\Users\Admin\AppData\Local\Temp\7202347.bat
          Filesize

          94B

          MD5

          3880eeb1c736d853eb13b44898b718ab

          SHA1

          4eec9d50360cd815211e3c4e6bdd08271b6ec8e6

          SHA256

          936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7

          SHA512

          3eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GVALQC~1.EXE
          Filesize

          1.5MB

          MD5

          358d759171a9f0da115c2a81cc9a2833

          SHA1

          a88fa8db32eaa5c3eca34b6c4fb480ecba13689d

          SHA256

          9a6faf9a3ef2e705abd3f284ff6deda392a7ad1e66f2214a7ee07e19eead0af2

          SHA512

          0eb48799fd59d83cbfe0d0f5ab6302efd953fd146ee09cd890b66f90458f756f703c8792a97fc773fd2c75700e1ffd9bff4b9495a5fd48beb65fd09422d95f84

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\GVALQC~1.EXE
          Filesize

          1.5MB

          MD5

          358d759171a9f0da115c2a81cc9a2833

          SHA1

          a88fa8db32eaa5c3eca34b6c4fb480ecba13689d

          SHA256

          9a6faf9a3ef2e705abd3f284ff6deda392a7ad1e66f2214a7ee07e19eead0af2

          SHA512

          0eb48799fd59d83cbfe0d0f5ab6302efd953fd146ee09cd890b66f90458f756f703c8792a97fc773fd2c75700e1ffd9bff4b9495a5fd48beb65fd09422d95f84

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZSbPN
          Filesize

          186KB

          MD5

          514d4e6cc207fb321467fd3ddb6ae93a

          SHA1

          fcf9f8d1d69ccdb06108e454e76884297fde6fc2

          SHA256

          7300b6db420ba1c9b2bb22bfd0fff91910d7ec8f66720a6a21a2dff96a9f32e7

          SHA512

          57fc890726f1bdd536552a08ae29f43632ae68dff60caa5a11f989fa02c170006196e282dc006a6c255f944a082284c6efbee2d0df6ca37645543a2d6dc6e3b5

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fEKI.exe
          Filesize

          915KB

          MD5

          b06e67f9767e5023892d9698703ad098

          SHA1

          acc07666f4c1d4461d3e1c263cf6a194a8dd1544

          SHA256

          8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

          SHA512

          7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

        • C:\Users\Admin\AppData\Roaming\ZSbPN
          Filesize

          140KB

          MD5

          55e1225df75cf2c505656a70d994023d

          SHA1

          21cdae71eda791d607532262d97841eef097e71c

          SHA256

          8031fd75799c001d511bb0a80148ec85d3d30c83c2f29fce2703f5330237eb48

          SHA512

          6ccc47f8dbb2e92f4a3246032f0c6beb1fa54153eb061598ca1a274f51d86e87a32ae224480f6fc51893a82ea52f344ad6d13ad6c99ee5c2774eb5f1648a8eff

        • C:\Users\Admin\AppData\Roaming\fEKI.exe
          Filesize

          915KB

          MD5

          b06e67f9767e5023892d9698703ad098

          SHA1

          acc07666f4c1d4461d3e1c263cf6a194a8dd1544

          SHA256

          8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

          SHA512

          7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

        • C:\Users\Admin\AppData\Roaming\fEKI.exe
          Filesize

          915KB

          MD5

          b06e67f9767e5023892d9698703ad098

          SHA1

          acc07666f4c1d4461d3e1c263cf6a194a8dd1544

          SHA256

          8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

          SHA512

          7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

        • C:\Users\Admin\AppData\Roaming\fEKI.exe
          Filesize

          915KB

          MD5

          b06e67f9767e5023892d9698703ad098

          SHA1

          acc07666f4c1d4461d3e1c263cf6a194a8dd1544

          SHA256

          8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

          SHA512

          7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\GVALQC~1.EXE
          Filesize

          1.5MB

          MD5

          358d759171a9f0da115c2a81cc9a2833

          SHA1

          a88fa8db32eaa5c3eca34b6c4fb480ecba13689d

          SHA256

          9a6faf9a3ef2e705abd3f284ff6deda392a7ad1e66f2214a7ee07e19eead0af2

          SHA512

          0eb48799fd59d83cbfe0d0f5ab6302efd953fd146ee09cd890b66f90458f756f703c8792a97fc773fd2c75700e1ffd9bff4b9495a5fd48beb65fd09422d95f84

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\GVALQC~1.EXE
          Filesize

          1.5MB

          MD5

          358d759171a9f0da115c2a81cc9a2833

          SHA1

          a88fa8db32eaa5c3eca34b6c4fb480ecba13689d

          SHA256

          9a6faf9a3ef2e705abd3f284ff6deda392a7ad1e66f2214a7ee07e19eead0af2

          SHA512

          0eb48799fd59d83cbfe0d0f5ab6302efd953fd146ee09cd890b66f90458f756f703c8792a97fc773fd2c75700e1ffd9bff4b9495a5fd48beb65fd09422d95f84

        • \Users\Admin\AppData\Roaming\fEKI.exe
          Filesize

          915KB

          MD5

          b06e67f9767e5023892d9698703ad098

          SHA1

          acc07666f4c1d4461d3e1c263cf6a194a8dd1544

          SHA256

          8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

          SHA512

          7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

        • \Users\Admin\AppData\Roaming\fEKI.exe
          Filesize

          915KB

          MD5

          b06e67f9767e5023892d9698703ad098

          SHA1

          acc07666f4c1d4461d3e1c263cf6a194a8dd1544

          SHA256

          8498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb

          SHA512

          7972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943

        • memory/280-89-0x0000000000400000-0x0000000000419000-memory.dmp
          Filesize

          100KB

        • memory/280-91-0x0000000000400000-0x0000000000419000-memory.dmp
          Filesize

          100KB

        • memory/280-93-0x0000000000400000-0x0000000000419000-memory.dmp
          Filesize

          100KB

        • memory/280-87-0x0000000000400000-0x0000000000419000-memory.dmp
          Filesize

          100KB

        • memory/280-102-0x0000000000400000-0x0000000000419000-memory.dmp
          Filesize

          100KB

        • memory/280-86-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
          Filesize

          4KB

        • memory/280-85-0x0000000000400000-0x0000000000419000-memory.dmp
          Filesize

          100KB

        • memory/904-121-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
          Filesize

          4KB

        • memory/904-126-0x0000000000400000-0x0000000000419000-memory.dmp
          Filesize

          100KB

        • memory/904-136-0x0000000000400000-0x0000000000419000-memory.dmp
          Filesize

          100KB

        • memory/1124-106-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
          Filesize

          4KB