Analysis
-
max time kernel
140s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
26-06-2023 23:24
Static task
static1
Behavioral task
behavioral1
Sample
5f697f9e967d6f2f01beb702cae01a5696444372545381315f68ce00c45902d0.exe
Resource
win7-20230621-en
General
-
Target
5f697f9e967d6f2f01beb702cae01a5696444372545381315f68ce00c45902d0.exe
-
Size
2.4MB
-
MD5
dd609583a5baf83eda150f9365e77067
-
SHA1
d449bd9634d29e429cc1378f171a00b018fd6b44
-
SHA256
5f697f9e967d6f2f01beb702cae01a5696444372545381315f68ce00c45902d0
-
SHA512
695259a378f7ed10cb1ffe7fe9e75f5af0fb6befe3d3333c9dcdb1ab8d2f8365639c033dda9d83738e28b37cf711b65e01395dcf853691ec7e41b1489a5fbcec
-
SSDEEP
24576:F2OTeFxvKLuoucZybHXMDg2cQV09aoz25OVn3GuQ5Y3h3js9shlieh:bTux6ZT0sozGK3Ns9shlFh
Malware Config
Extracted
pony
http://www.alberghi.com:8080/pony/gate.php
http://buyandsmile.atomclick.co:8080/pony/gate.php
-
payload_url
http://ftp.eburneenne.com/7zBY7xS.exe
http://www.spetter.com/mi19YgV.exe
http://photosfoto.com/uTM.exe
http://www.daginternacional.com/trXe.exe
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Child.exepid process 1932 Child.exe -
Loads dropped DLL 6 IoCs
Processes:
cmd.exeWerFault.exepid process 1976 cmd.exe 568 WerFault.exe 568 WerFault.exe 568 WerFault.exe 568 WerFault.exe 568 WerFault.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 568 1932 WerFault.exe Child.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Child.exepid process 1932 Child.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5f697f9e967d6f2f01beb702cae01a5696444372545381315f68ce00c45902d0.execmd.exeChild.exedescription pid process target process PID 1724 wrote to memory of 1976 1724 5f697f9e967d6f2f01beb702cae01a5696444372545381315f68ce00c45902d0.exe cmd.exe PID 1724 wrote to memory of 1976 1724 5f697f9e967d6f2f01beb702cae01a5696444372545381315f68ce00c45902d0.exe cmd.exe PID 1724 wrote to memory of 1976 1724 5f697f9e967d6f2f01beb702cae01a5696444372545381315f68ce00c45902d0.exe cmd.exe PID 1724 wrote to memory of 1976 1724 5f697f9e967d6f2f01beb702cae01a5696444372545381315f68ce00c45902d0.exe cmd.exe PID 1976 wrote to memory of 1932 1976 cmd.exe Child.exe PID 1976 wrote to memory of 1932 1976 cmd.exe Child.exe PID 1976 wrote to memory of 1932 1976 cmd.exe Child.exe PID 1976 wrote to memory of 1932 1976 cmd.exe Child.exe PID 1932 wrote to memory of 568 1932 Child.exe WerFault.exe PID 1932 wrote to memory of 568 1932 Child.exe WerFault.exe PID 1932 wrote to memory of 568 1932 Child.exe WerFault.exe PID 1932 wrote to memory of 568 1932 Child.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f697f9e967d6f2f01beb702cae01a5696444372545381315f68ce00c45902d0.exe"C:\Users\Admin\AppData\Local\Temp\5f697f9e967d6f2f01beb702cae01a5696444372545381315f68ce00c45902d0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\Child.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\Child.exe.\Child.exe3⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 1924⤵
- Loads dropped DLL
- Program crash
PID:568
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Child.exeFilesize
137KB
MD500f447529c6b07feaf76e7e00ec4b50a
SHA125bae6d02ff7c6d1a19e3ffc2936c650645d2265
SHA25681552d75d8021824d8e516357a306f38c25e904e83accbcf806e6a33fbc0d9ce
SHA51254a5bf50c9ba4293882f708bd6ba2ea44b93e17d23694153f1d6f9b0e84ea73674b076c793d6f582b6c6362367777dade2d1d372a2b437b2830a2356a4228664
-
C:\Users\Admin\AppData\Local\Temp\Child.exeFilesize
137KB
MD500f447529c6b07feaf76e7e00ec4b50a
SHA125bae6d02ff7c6d1a19e3ffc2936c650645d2265
SHA25681552d75d8021824d8e516357a306f38c25e904e83accbcf806e6a33fbc0d9ce
SHA51254a5bf50c9ba4293882f708bd6ba2ea44b93e17d23694153f1d6f9b0e84ea73674b076c793d6f582b6c6362367777dade2d1d372a2b437b2830a2356a4228664
-
\Users\Admin\AppData\Local\Temp\Child.exeFilesize
137KB
MD500f447529c6b07feaf76e7e00ec4b50a
SHA125bae6d02ff7c6d1a19e3ffc2936c650645d2265
SHA25681552d75d8021824d8e516357a306f38c25e904e83accbcf806e6a33fbc0d9ce
SHA51254a5bf50c9ba4293882f708bd6ba2ea44b93e17d23694153f1d6f9b0e84ea73674b076c793d6f582b6c6362367777dade2d1d372a2b437b2830a2356a4228664
-
\Users\Admin\AppData\Local\Temp\Child.exeFilesize
137KB
MD500f447529c6b07feaf76e7e00ec4b50a
SHA125bae6d02ff7c6d1a19e3ffc2936c650645d2265
SHA25681552d75d8021824d8e516357a306f38c25e904e83accbcf806e6a33fbc0d9ce
SHA51254a5bf50c9ba4293882f708bd6ba2ea44b93e17d23694153f1d6f9b0e84ea73674b076c793d6f582b6c6362367777dade2d1d372a2b437b2830a2356a4228664
-
\Users\Admin\AppData\Local\Temp\Child.exeFilesize
137KB
MD500f447529c6b07feaf76e7e00ec4b50a
SHA125bae6d02ff7c6d1a19e3ffc2936c650645d2265
SHA25681552d75d8021824d8e516357a306f38c25e904e83accbcf806e6a33fbc0d9ce
SHA51254a5bf50c9ba4293882f708bd6ba2ea44b93e17d23694153f1d6f9b0e84ea73674b076c793d6f582b6c6362367777dade2d1d372a2b437b2830a2356a4228664
-
\Users\Admin\AppData\Local\Temp\Child.exeFilesize
137KB
MD500f447529c6b07feaf76e7e00ec4b50a
SHA125bae6d02ff7c6d1a19e3ffc2936c650645d2265
SHA25681552d75d8021824d8e516357a306f38c25e904e83accbcf806e6a33fbc0d9ce
SHA51254a5bf50c9ba4293882f708bd6ba2ea44b93e17d23694153f1d6f9b0e84ea73674b076c793d6f582b6c6362367777dade2d1d372a2b437b2830a2356a4228664
-
\Users\Admin\AppData\Local\Temp\Child.exeFilesize
137KB
MD500f447529c6b07feaf76e7e00ec4b50a
SHA125bae6d02ff7c6d1a19e3ffc2936c650645d2265
SHA25681552d75d8021824d8e516357a306f38c25e904e83accbcf806e6a33fbc0d9ce
SHA51254a5bf50c9ba4293882f708bd6ba2ea44b93e17d23694153f1d6f9b0e84ea73674b076c793d6f582b6c6362367777dade2d1d372a2b437b2830a2356a4228664
-
\Users\Admin\AppData\Local\Temp\Child.exeFilesize
137KB
MD500f447529c6b07feaf76e7e00ec4b50a
SHA125bae6d02ff7c6d1a19e3ffc2936c650645d2265
SHA25681552d75d8021824d8e516357a306f38c25e904e83accbcf806e6a33fbc0d9ce
SHA51254a5bf50c9ba4293882f708bd6ba2ea44b93e17d23694153f1d6f9b0e84ea73674b076c793d6f582b6c6362367777dade2d1d372a2b437b2830a2356a4228664
-
memory/1724-66-0x0000000000400000-0x0000000000525000-memory.dmpFilesize
1.1MB
-
memory/1932-64-0x0000000000280000-0x00000000002A4000-memory.dmpFilesize
144KB
-
memory/1932-65-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1932-63-0x0000000000260000-0x0000000000277000-memory.dmpFilesize
92KB