Analysis

  • max time kernel
    153s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 13:55

General

  • Target

    38d4ede73922c954bb50a17bf19b1512.exe

  • Size

    282KB

  • MD5

    38d4ede73922c954bb50a17bf19b1512

  • SHA1

    6a874e4d91c435b1261f5f4ba4431f029a1e313a

  • SHA256

    89cb43f5d0ea274df6fda6b6728e45c52dfb0161c1c4210eb676a377914dbbe7

  • SHA512

    35e8790da918f937b172aa572e9fe0d341d2098c050130327ef111c3c7c9860545cdbd542751060dc1d9e38496bbefa5cb41a3a95766dbcbeb45c8c1591d19ba

  • SSDEEP

    6144:1YuUamTcIuw4mPMZ50HFGgGfILJ/Zv/TGmUs+xkFrb+ANbsj:1JpB10w8L5F/TG/k59U

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Disables taskbar notifications via registry modification
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\38d4ede73922c954bb50a17bf19b1512.exe
    "C:\Users\Admin\AppData\Local\Temp\38d4ede73922c954bb50a17bf19b1512.exe"
    1⤵
    • Modifies security service
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2252
    • C:\Program Files (x86)\LP\717B\53AC.tmp
      "C:\Program Files (x86)\LP\717B\53AC.tmp"
      2⤵
      • Executes dropped EXE
      PID:1652
    • C:\Users\Admin\AppData\Local\Temp\38d4ede73922c954bb50a17bf19b1512.exe
      C:\Users\Admin\AppData\Local\Temp\38d4ede73922c954bb50a17bf19b1512.exe startC:\Users\Admin\AppData\Roaming\BF1C9\E5071.exe%C:\Users\Admin\AppData\Roaming\BF1C9
      2⤵
        PID:1376
      • C:\Users\Admin\AppData\Local\Temp\38d4ede73922c954bb50a17bf19b1512.exe
        C:\Users\Admin\AppData\Local\Temp\38d4ede73922c954bb50a17bf19b1512.exe startC:\Program Files (x86)\C991C\lvvm.exe%C:\Program Files (x86)\C991C
        2⤵
          PID:2848
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2732
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:328

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\BF1C9\991C.F1C

        Filesize

        300B

        MD5

        9769d756d162dd73b83972ca624979e2

        SHA1

        821f2d6c6a3445b881be3c1abe8db9dea978dc32

        SHA256

        16130b8a1218e3708c0e70180c7ecbd7b64b09bd10e21962dd15659603c42158

        SHA512

        78d2b756bf15b912846efe679990a5c688f198411cbf6cf75b1676c2bd4b09df77d039116d6c4dd70b67cd2bcd4233d3df70e05168cdcb8328bbc3418a254214

      • C:\Users\Admin\AppData\Roaming\BF1C9\991C.F1C

        Filesize

        1KB

        MD5

        bbb37676ccdfb7149075a163b8c988b4

        SHA1

        863bac6bff25bb55628fd11b7700385e4516364a

        SHA256

        6f61a697cfca7601c257e9b13c449cf1e3c272d5dfcada99136b4bed3eb17ad4

        SHA512

        2e41d9578ea1de22729a47d280dd1b6a718e0e14c04ff5ec05ab26e3679eb4a5b9a2ea99f11a5c1d69417149478e3902c6c5ad5aa9055ed0aebb9d65660f15c6

      • C:\Users\Admin\AppData\Roaming\BF1C9\991C.F1C

        Filesize

        897B

        MD5

        8ce5a94b27393c2797d929362aec3f16

        SHA1

        72544d1dab94bf797e4b6a963c5efd09231e4c08

        SHA256

        ba5bf2f72e7a0a68ccc8a37d0e3ac65d8eb11bb9e6811229668f038b299637f2

        SHA512

        7b9c297c7188ff9342b9dca32849a389c49be92e37da4b5ae67574bdae73c9deffb81016f8b24e9732aa0a6287a9778909d11a74ac41e2f8ae82676a55fe10d2

      • \Program Files (x86)\LP\717B\53AC.tmp

        Filesize

        99KB

        MD5

        82d50af33ff156670a076dc834a99b4d

        SHA1

        d5e3662e28d51a8366fb214d77585b95984541d1

        SHA256

        7f57b37aa39698068271e64bbb42ff74b1a2b6157d233d8bdef1f683a7230a7d

        SHA512

        527986d4cca9998059e278de71989f3f46851eace0370cb2bfd69dc7292d5a1597a373ff2b350137eeea8dd7dd13a0e8de8b6306795e4b5a6428fab6c1b27563

      • memory/328-133-0x0000000002280000-0x0000000002281000-memory.dmp

        Filesize

        4KB

      • memory/328-15-0x0000000002280000-0x0000000002281000-memory.dmp

        Filesize

        4KB

      • memory/1376-36-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1376-37-0x0000000000549000-0x000000000058F000-memory.dmp

        Filesize

        280KB

      • memory/1652-39-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/1652-38-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/1652-33-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/1652-34-0x0000000000860000-0x0000000000960000-memory.dmp

        Filesize

        1024KB

      • memory/2252-1-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2252-6-0x0000000000520000-0x0000000000620000-memory.dmp

        Filesize

        1024KB

      • memory/2252-8-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2252-32-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2252-5-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2252-3-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2252-134-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2252-2-0x0000000000520000-0x0000000000620000-memory.dmp

        Filesize

        1024KB

      • memory/2252-207-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2848-131-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2848-132-0x0000000000559000-0x000000000059F000-memory.dmp

        Filesize

        280KB