Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 11:12
Static task
static1
Behavioral task
behavioral1
Sample
69e482279da56ae83bd876f04b0395ec.exe
Resource
win7-20231215-en
General
-
Target
69e482279da56ae83bd876f04b0395ec.exe
-
Size
124KB
-
MD5
69e482279da56ae83bd876f04b0395ec
-
SHA1
16ec0c4d207c941f796423cdc64c54af3a5dd110
-
SHA256
7ea0f8ae396036ce6a2b740bfd07c57ff94b51bd32389860c35a39af4c461854
-
SHA512
bc8a1980a48fc272e587123c68b0d7a0cb7c7b654b45d1d914a5751fda28f53dd968ae6c6c1c972c6e5191193aba6b916d3b4fd2ba9722bb0f90c2b94b14e3e6
-
SSDEEP
1536:kkR1gLaC2iLUmZDFveTCfRVdDe90DjM0wjeve8xtwcsZjWi0R5CCAF3XnHh:jR1z2bF8Irq0o0w6ocUj05vAD
Malware Config
Extracted
pony
http://184.164.151.54/forum/viewtopic.php
http://173.246.101.197/forum/viewtopic.php
-
payload_url
http://www.admirals.ae/bAYWzn5.exe
http://ftp.selonic.de/iqXUWA.exe
http://indosu.com/94rXrL.exe
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 69e482279da56ae83bd876f04b0395ec.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 69e482279da56ae83bd876f04b0395ec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2536 set thread context of 2180 2536 69e482279da56ae83bd876f04b0395ec.exe 28 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 2180 69e482279da56ae83bd876f04b0395ec.exe Token: SeTcbPrivilege 2180 69e482279da56ae83bd876f04b0395ec.exe Token: SeChangeNotifyPrivilege 2180 69e482279da56ae83bd876f04b0395ec.exe Token: SeCreateTokenPrivilege 2180 69e482279da56ae83bd876f04b0395ec.exe Token: SeBackupPrivilege 2180 69e482279da56ae83bd876f04b0395ec.exe Token: SeRestorePrivilege 2180 69e482279da56ae83bd876f04b0395ec.exe Token: SeIncreaseQuotaPrivilege 2180 69e482279da56ae83bd876f04b0395ec.exe Token: SeAssignPrimaryTokenPrivilege 2180 69e482279da56ae83bd876f04b0395ec.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2180 2536 69e482279da56ae83bd876f04b0395ec.exe 28 PID 2536 wrote to memory of 2180 2536 69e482279da56ae83bd876f04b0395ec.exe 28 PID 2536 wrote to memory of 2180 2536 69e482279da56ae83bd876f04b0395ec.exe 28 PID 2536 wrote to memory of 2180 2536 69e482279da56ae83bd876f04b0395ec.exe 28 PID 2536 wrote to memory of 2180 2536 69e482279da56ae83bd876f04b0395ec.exe 28 PID 2536 wrote to memory of 2180 2536 69e482279da56ae83bd876f04b0395ec.exe 28 PID 2536 wrote to memory of 2180 2536 69e482279da56ae83bd876f04b0395ec.exe 28 PID 2536 wrote to memory of 2180 2536 69e482279da56ae83bd876f04b0395ec.exe 28 PID 2536 wrote to memory of 2180 2536 69e482279da56ae83bd876f04b0395ec.exe 28 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 69e482279da56ae83bd876f04b0395ec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69e482279da56ae83bd876f04b0395ec.exe"C:\Users\Admin\AppData\Local\Temp\69e482279da56ae83bd876f04b0395ec.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\69e482279da56ae83bd876f04b0395ec.exe"C:\Users\Admin\AppData\Local\Temp\69e482279da56ae83bd876f04b0395ec.exe"2⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
PID:2180
-