Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 02:43
Static task
static1
Behavioral task
behavioral1
Sample
5a1180ecba01d7feddb5da75ca04c112.exe
Resource
win7-20231215-en
General
-
Target
5a1180ecba01d7feddb5da75ca04c112.exe
-
Size
132KB
-
MD5
5a1180ecba01d7feddb5da75ca04c112
-
SHA1
b0d5b40ca5da74e4d5131166470d9b15031d61e4
-
SHA256
3c3874247af17a1e69899bbd2e71f3791a5d9d53fdabc76cbb1dca15e8048583
-
SHA512
84b6fee78de918b6a2d0e8ef7c0339caabdfff8c90f73f18908aa03b6ca041cac7737846e31af9b904b0793d2aa73bf990f5ad9fcee9fa873b22421ee97dbe26
-
SSDEEP
1536:RojZXPLmxwHOU72o6lr1byvwDIc6+0D5lyMd9oMb3uW4gFsuzCdBxhFapEfz63Lu:SKFQ7eYRcTel7rx4U4dHaqmTi8D
Malware Config
Extracted
pony
http://205.185.125.165:8080/forum/viewtopic.php
http://ads.9bravo.com:8080/forum/viewtopic.php
http://banner.9bravo.com:8080/forum/viewtopic.php
http://cache.9bravo.com:8080/forum/viewtopic.php
-
payload_url
http://ftp.coldwellbankerthomas.com/1J5sBaVR.exe
http://inthe1970s.com/6vVbwcB.exe
http://ftp.triatlonbb.sk/ddKt.exe
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 5a1180ecba01d7feddb5da75ca04c112.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 5a1180ecba01d7feddb5da75ca04c112.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 4728 5a1180ecba01d7feddb5da75ca04c112.exe Token: SeTcbPrivilege 4728 5a1180ecba01d7feddb5da75ca04c112.exe Token: SeChangeNotifyPrivilege 4728 5a1180ecba01d7feddb5da75ca04c112.exe Token: SeCreateTokenPrivilege 4728 5a1180ecba01d7feddb5da75ca04c112.exe Token: SeBackupPrivilege 4728 5a1180ecba01d7feddb5da75ca04c112.exe Token: SeRestorePrivilege 4728 5a1180ecba01d7feddb5da75ca04c112.exe Token: SeIncreaseQuotaPrivilege 4728 5a1180ecba01d7feddb5da75ca04c112.exe Token: SeAssignPrimaryTokenPrivilege 4728 5a1180ecba01d7feddb5da75ca04c112.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 5a1180ecba01d7feddb5da75ca04c112.exe