Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2024, 23:33

General

  • Target

    47740279995f3c51087bf01fe8a4d901.exe

  • Size

    286KB

  • MD5

    47740279995f3c51087bf01fe8a4d901

  • SHA1

    91ed7628c367b40c3db07752e1b9345e0752e252

  • SHA256

    2e8cc7c54ad24b23ec164f475cbafec0c2cee12fbc6593544e0d4f8999bd9e6d

  • SHA512

    115b18309c735d90e3344bc1a5a4276c0418a45e5a0bcddaa098b5c0ac10d8f878452cf05f647e19acf593a33edb8ef0981c5df91d01eb702e6a89aec97da75b

  • SSDEEP

    6144:349tPFmx+RLcd7FpigfViBXsVoLBnMq0mPuBK7co4rKX1jz:36tPFmx+RLCFptuYYnPGBrhK

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Disables taskbar notifications via registry modification
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 3 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 17 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\47740279995f3c51087bf01fe8a4d901.exe
    "C:\Users\Admin\AppData\Local\Temp\47740279995f3c51087bf01fe8a4d901.exe"
    1⤵
    • Modifies security service
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:760
    • C:\Users\Admin\AppData\Local\Temp\47740279995f3c51087bf01fe8a4d901.exe
      C:\Users\Admin\AppData\Local\Temp\47740279995f3c51087bf01fe8a4d901.exe startC:\Users\Admin\AppData\Roaming\52276\B1EAA.exe%C:\Users\Admin\AppData\Roaming\52276
      2⤵
        PID:1488
      • C:\Users\Admin\AppData\Local\Temp\47740279995f3c51087bf01fe8a4d901.exe
        C:\Users\Admin\AppData\Local\Temp\47740279995f3c51087bf01fe8a4d901.exe startC:\Program Files (x86)\7602E\lvvm.exe%C:\Program Files (x86)\7602E
        2⤵
          PID:2736
        • C:\Program Files (x86)\LP\AA35\C8E.tmp
          "C:\Program Files (x86)\LP\AA35\C8E.tmp"
          2⤵
          • Executes dropped EXE
          PID:2348
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2808
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2764

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\52276\602E.227

        Filesize

        996B

        MD5

        916b6daca4ef6482de2a7da69b2fa58f

        SHA1

        667717308a29e2c4c7ba286551626f7ff8ef028f

        SHA256

        8bb301d9ad1942bbd8259e1832d4e58e241e67a6b697a2bd7d69edd225e5b7cd

        SHA512

        40c61b62d96155062e62fbde8af7ba3fc8e1020a30c1726588f0944a52d95769bc8446b169510554c6ef74d1a61f37f8c9c51cd28ecf29303e0f5fed32efc92d

      • C:\Users\Admin\AppData\Roaming\52276\602E.227

        Filesize

        1KB

        MD5

        18e35d70c12e4586137e272f8cf15e67

        SHA1

        91284aa734078b807ebc9bfa3e227226e99ca316

        SHA256

        aea051eca7a46859ffabc1112548504a0e6cc3cac814430488c9d9f9297c5419

        SHA512

        ecd4e7542949b307424cf6f2cc6b979024229dbb06040f770ada2140691d9e4748d21bdb72efbaebc92a3478b363e64dc3e99f008d3f3006ccfbab33ef65972d

      • C:\Users\Admin\AppData\Roaming\52276\602E.227

        Filesize

        600B

        MD5

        c01b2a1feff498d9a2e30e2a58b6b6b7

        SHA1

        f468ca6a6a856896d0bf9f435c670e1a287e4110

        SHA256

        7bee97122432f27cc313b0e4e55ebf39d555ee8216806def416988cb6112008a

        SHA512

        0db6546d65c505bac6bf5b20ac8d0382a2e032b36136cda880991f52451100e7b394c1a310dde9c05b64efee563adceef4fc32ec8dd91f3542a945eac91554f9

      • \Program Files (x86)\LP\AA35\C8E.tmp

        Filesize

        102KB

        MD5

        6d7f922d6214ef1996346395afd017be

        SHA1

        5594d286e8b8e46008426e15ffd53e86f4143d15

        SHA256

        4e58ef597c40404d3286c87cc13ea0563f4d08dacb4b40ea3d8b6744221898ae

        SHA512

        9dc8ac8d33268face5a007dce5cf5c7c1b749f1a656fdc70276ad431392978f47fbbae0e1d625040acc01641d9f7b5341d7b28b68169f39a1df789ea12654626

      • memory/760-1-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/760-2-0x0000000000530000-0x0000000000630000-memory.dmp

        Filesize

        1024KB

      • memory/760-3-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/760-12-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/760-303-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/760-17-0x0000000000530000-0x0000000000630000-memory.dmp

        Filesize

        1024KB

      • memory/760-171-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/760-310-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1488-15-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/1488-306-0x00000000005F0000-0x00000000006F0000-memory.dmp

        Filesize

        1024KB

      • memory/1488-16-0x00000000005F0000-0x00000000006F0000-memory.dmp

        Filesize

        1024KB

      • memory/1488-14-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2348-304-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/2348-305-0x0000000000540000-0x0000000000640000-memory.dmp

        Filesize

        1024KB

      • memory/2348-307-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/2348-309-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/2736-175-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2736-176-0x00000000005E0000-0x00000000006E0000-memory.dmp

        Filesize

        1024KB

      • memory/2736-174-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2764-172-0x0000000004090000-0x0000000004091000-memory.dmp

        Filesize

        4KB

      • memory/2764-311-0x0000000004090000-0x0000000004091000-memory.dmp

        Filesize

        4KB