Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 05:20
Static task
static1
Behavioral task
behavioral1
Sample
079429a05ce57875cca8c38720d31c2e.exe
Resource
win7-20231215-en
General
-
Target
079429a05ce57875cca8c38720d31c2e.exe
-
Size
129KB
-
MD5
079429a05ce57875cca8c38720d31c2e
-
SHA1
5c778e757f9ca7a4634f979f7de69bd8ee8d8a1a
-
SHA256
5b7d08c2c13f94fea3ff8f017bc1277ae16080885e4fe9a39f9c554147f46b23
-
SHA512
5fb4066d709aacc1e79257aeff42a21b2698ca087a05467c779cf693cb8dcd66ac1035196c7078ffc4b57989dfd90bc85659cd012b9accd3c794b748f16095db
-
SSDEEP
1536:UUBiFqtXmPmgC9Xc7LPY3pf+gij01r7TNwm7QQHfADHkTZvMS3J/HjYWtLm1DK:UOn16mg2X6gR+B43TNwIWTM/DzqD
Malware Config
Extracted
pony
http://67.215.225.205:8080/forum/viewtopic.php
http://74.91.117.168/forum/viewtopic.php
-
payload_url
http://codglobal.com/9WsB.exe
http://edpromagna.zeronove.it/pUR.exe
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 079429a05ce57875cca8c38720d31c2e.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 079429a05ce57875cca8c38720d31c2e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2792 set thread context of 2188 2792 079429a05ce57875cca8c38720d31c2e.exe 28 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 2188 079429a05ce57875cca8c38720d31c2e.exe Token: SeTcbPrivilege 2188 079429a05ce57875cca8c38720d31c2e.exe Token: SeChangeNotifyPrivilege 2188 079429a05ce57875cca8c38720d31c2e.exe Token: SeCreateTokenPrivilege 2188 079429a05ce57875cca8c38720d31c2e.exe Token: SeBackupPrivilege 2188 079429a05ce57875cca8c38720d31c2e.exe Token: SeRestorePrivilege 2188 079429a05ce57875cca8c38720d31c2e.exe Token: SeIncreaseQuotaPrivilege 2188 079429a05ce57875cca8c38720d31c2e.exe Token: SeAssignPrimaryTokenPrivilege 2188 079429a05ce57875cca8c38720d31c2e.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2188 2792 079429a05ce57875cca8c38720d31c2e.exe 28 PID 2792 wrote to memory of 2188 2792 079429a05ce57875cca8c38720d31c2e.exe 28 PID 2792 wrote to memory of 2188 2792 079429a05ce57875cca8c38720d31c2e.exe 28 PID 2792 wrote to memory of 2188 2792 079429a05ce57875cca8c38720d31c2e.exe 28 PID 2792 wrote to memory of 2188 2792 079429a05ce57875cca8c38720d31c2e.exe 28 PID 2792 wrote to memory of 2188 2792 079429a05ce57875cca8c38720d31c2e.exe 28 PID 2792 wrote to memory of 2188 2792 079429a05ce57875cca8c38720d31c2e.exe 28 PID 2792 wrote to memory of 2188 2792 079429a05ce57875cca8c38720d31c2e.exe 28 PID 2792 wrote to memory of 2188 2792 079429a05ce57875cca8c38720d31c2e.exe 28 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 079429a05ce57875cca8c38720d31c2e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\079429a05ce57875cca8c38720d31c2e.exe"C:\Users\Admin\AppData\Local\Temp\079429a05ce57875cca8c38720d31c2e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\079429a05ce57875cca8c38720d31c2e.exe"C:\Users\Admin\AppData\Local\Temp\079429a05ce57875cca8c38720d31c2e.exe"2⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
PID:2188
-