Analysis

  • max time kernel
    143s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 18:47

General

  • Target

    3d9a677ec60a3493bb4e8a53dd0cdae4.exe

  • Size

    285KB

  • MD5

    3d9a677ec60a3493bb4e8a53dd0cdae4

  • SHA1

    50a9f88d3f0a6e739448feb738c7a8633044f333

  • SHA256

    9f613dcad83a0667f77f7854f0cce2271e2dfca832ffa601c639ba2229e2ccd5

  • SHA512

    5330ab21d1249f0234f9abb751607ac3afebc33c5c0a31cec94d0a9813f960545d4e8f4b6b7a9d10fd13707cf6d7422cb54cd89e596a9692d32e47cb0ad5cc02

  • SSDEEP

    6144:2Fr8XRup34sB7VF4iE/XO3KxiYVS7GK5xxt8ZkBrVk6s36Gn+W:2Nx4A7vG/ea8cSFxx60rVJs36G1

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Disables taskbar notifications via registry modification
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 3 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 17 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d9a677ec60a3493bb4e8a53dd0cdae4.exe
    "C:\Users\Admin\AppData\Local\Temp\3d9a677ec60a3493bb4e8a53dd0cdae4.exe"
    1⤵
    • Modifies security service
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2004
    • C:\Users\Admin\AppData\Local\Temp\3d9a677ec60a3493bb4e8a53dd0cdae4.exe
      C:\Users\Admin\AppData\Local\Temp\3d9a677ec60a3493bb4e8a53dd0cdae4.exe startC:\Users\Admin\AppData\Roaming\4C96D\137F1.exe%C:\Users\Admin\AppData\Roaming\4C96D
      2⤵
        PID:1736
      • C:\Users\Admin\AppData\Local\Temp\3d9a677ec60a3493bb4e8a53dd0cdae4.exe
        C:\Users\Admin\AppData\Local\Temp\3d9a677ec60a3493bb4e8a53dd0cdae4.exe startC:\Program Files (x86)\6D7E9\lvvm.exe%C:\Program Files (x86)\6D7E9
        2⤵
          PID:1760
        • C:\Program Files (x86)\LP\F1B4\97CD.tmp
          "C:\Program Files (x86)\LP\F1B4\97CD.tmp"
          2⤵
          • Executes dropped EXE
          PID:2356
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2944
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1536

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\LP\F1B4\97CD.tmp

              Filesize

              102KB

              MD5

              6d7f922d6214ef1996346395afd017be

              SHA1

              5594d286e8b8e46008426e15ffd53e86f4143d15

              SHA256

              4e58ef597c40404d3286c87cc13ea0563f4d08dacb4b40ea3d8b6744221898ae

              SHA512

              9dc8ac8d33268face5a007dce5cf5c7c1b749f1a656fdc70276ad431392978f47fbbae0e1d625040acc01641d9f7b5341d7b28b68169f39a1df789ea12654626

            • C:\Users\Admin\AppData\Roaming\4C96D\D7E9.C96

              Filesize

              600B

              MD5

              96ee3ea2bb2ea776f8583eecac33d9a8

              SHA1

              c56deda70b1fae869f8b763135d2c2ed66f8b20f

              SHA256

              03d1594daba0ca44f13a3ad25de1a86a5ede178ac8a6b37d52e471d832ad47d8

              SHA512

              ca9e47a6cd085533e27855d48137a48ae7a151d88d4ce1088952e3ba986cf9d46d2238e4ccf9724e7f2b856e52aec4c2946504652d7f20f07192ee42ee63579d

            • C:\Users\Admin\AppData\Roaming\4C96D\D7E9.C96

              Filesize

              996B

              MD5

              892200198a8a45fa067e0467b569bd23

              SHA1

              52e44700f29ebf9c1a509ce29d4ef85ae10877df

              SHA256

              ab6292abc696d7ec067def5f8aa05055eabb62d9acb21a96d5e9aeab3d53e1c9

              SHA512

              65af0c7383d73bc58fbda540c1706bc540d423cfd1c3455d0173db896c92b41268c2ed32a7cc0d1ddc78123cf18424f9db9a05ed6e32dbffd7d0bf8fa76d10d2

            • C:\Users\Admin\AppData\Roaming\4C96D\D7E9.C96

              Filesize

              1KB

              MD5

              62f7e3145082498c118d0299c336228e

              SHA1

              eca756ca9e1fb36c06cf92cadd553a4483d30c71

              SHA256

              b65fe52b4f319e9d979d6405c8bee80b5549bf4c347337d03a33b059ad88dcb3

              SHA512

              90d271b9d28eca71a7ae05e4dc47238d8ed843b2e45f9900a7449ee54ce42f01f17aa9f28cafa3cff1d19fce4f104774d8759c557270cf30c8a6bd1e32b741a9

            • memory/1536-333-0x0000000004770000-0x0000000004771000-memory.dmp

              Filesize

              4KB

            • memory/1536-65-0x0000000004770000-0x0000000004771000-memory.dmp

              Filesize

              4KB

            • memory/1736-64-0x00000000002D5000-0x000000000031B000-memory.dmp

              Filesize

              280KB

            • memory/1736-63-0x0000000000400000-0x000000000046B000-memory.dmp

              Filesize

              428KB

            • memory/1760-202-0x0000000000535000-0x000000000057B000-memory.dmp

              Filesize

              280KB

            • memory/1760-201-0x0000000000400000-0x000000000046B000-memory.dmp

              Filesize

              428KB

            • memory/2004-60-0x0000000000400000-0x000000000046B000-memory.dmp

              Filesize

              428KB

            • memory/2004-1-0x0000000000400000-0x000000000046B000-memory.dmp

              Filesize

              428KB

            • memory/2004-206-0x0000000000400000-0x000000000046B000-memory.dmp

              Filesize

              428KB

            • memory/2004-61-0x0000000000230000-0x0000000000330000-memory.dmp

              Filesize

              1024KB

            • memory/2004-2-0x0000000000230000-0x0000000000330000-memory.dmp

              Filesize

              1024KB

            • memory/2004-332-0x0000000000400000-0x000000000046B000-memory.dmp

              Filesize

              428KB

            • memory/2356-205-0x00000000005B0000-0x00000000006B0000-memory.dmp

              Filesize

              1024KB

            • memory/2356-204-0x0000000000400000-0x000000000041C000-memory.dmp

              Filesize

              112KB

            • memory/2356-323-0x0000000000400000-0x000000000041C000-memory.dmp

              Filesize

              112KB