Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 10:39

General

  • Target

    a1a8b9c13360898aebd46c12abee7018.exe

  • Size

    274KB

  • MD5

    a1a8b9c13360898aebd46c12abee7018

  • SHA1

    03bdba42f863a52b325eed51b8b39d4f91b27077

  • SHA256

    f11939bf24b075fec37a952e68bc0a9b94eca67dd105d4a9d58e8925a744b263

  • SHA512

    b65cec6b7f4313ea4f2ceb297c496bfe8b3da46d0f683e073f353bd02d02d25779dee5fcc95b3b7e4e61ec4cef6f1980a4b59533530f78316d209bc1e73fd2e7

  • SSDEEP

    6144:KzPvmPqyDRfTCMVsVXlmd/S9nUg6f2SBn8kUBMyTcRTZQ:ImPFO/Xsw9Ug6f2OFUqyToN

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1a8b9c13360898aebd46c12abee7018.exe
    "C:\Users\Admin\AppData\Local\Temp\a1a8b9c13360898aebd46c12abee7018.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Users\Admin\AppData\Local\Temp\a1a8b9c13360898aebd46c12abee7018.exe
      C:\Users\Admin\AppData\Local\Temp\a1a8b9c13360898aebd46c12abee7018.exe startC:\Program Files (x86)\Internet Explorer\D3A7\4DF.exe%C:\Program Files (x86)\Internet Explorer\D3A7
      2⤵
        PID:840
      • C:\Users\Admin\AppData\Local\Temp\a1a8b9c13360898aebd46c12abee7018.exe
        C:\Users\Admin\AppData\Local\Temp\a1a8b9c13360898aebd46c12abee7018.exe startC:\Program Files (x86)\3E8E1\lvvm.exe%C:\Program Files (x86)\3E8E1
        2⤵
          PID:1496
        • C:\Program Files (x86)\Internet Explorer\D3A7\A035.tmp
          "C:\Program Files (x86)\Internet Explorer\D3A7\A035.tmp"
          2⤵
          • Executes dropped EXE
          PID:680

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\76B3E\E8E1.6B3

        Filesize

        1KB

        MD5

        a7c8d310c852b5f575a7d21d2f8db28d

        SHA1

        65cbcdef5805f93c108a8a45350609d27720d79c

        SHA256

        30bfecc0c0fd5925608839279bf2cefa72ea41e18660ee22a52c156ddfccf533

        SHA512

        f04f1aae136ce176292cf1b03fa04239e51f219741785f5c4881cd05e52b39223285abeffac9bdcac1deb6d8e4332d49be7acb4aec781a1f808f0d8a5e754f44

      • C:\Users\Admin\AppData\Roaming\76B3E\E8E1.6B3

        Filesize

        600B

        MD5

        c3e0a327cefce0cb2d7a7d9ecc948798

        SHA1

        0066ac3de2728c7b5f1448091c72d9cce0615eb2

        SHA256

        a10ea921d822ceab3b1af055b15d39f847274e76a77fb763d6cc5d47e68b8cba

        SHA512

        3572371de3a684c4f6bdf58f073bc767c33417b045093754b1b505ffe73e785657c331e8d4745091a2190e633fc2438984b96be579bed50d7e2c33b9abdbf290

      • C:\Users\Admin\AppData\Roaming\76B3E\E8E1.6B3

        Filesize

        996B

        MD5

        8ac24754bdea3ec3853478d11625ab99

        SHA1

        0d9d2e21a54162a2a1cc580bfcdb96ed7b8a874f

        SHA256

        6328e5eeaa8de211fe01703a6d9e8c49f97f5aa3a79bab900c6209033a930542

        SHA512

        a0a195abdf95b5b9f6779cbb3318f0a189a7f68c9103091eadc64ad5842838f679f5bc8409df98c96ad283d3a2ff6a2c4567a5589f6cd8332c195d99c71ceb50

      • \Program Files (x86)\Internet Explorer\D3A7\A035.tmp

        Filesize

        102KB

        MD5

        98983d9e6d149afd05c73f9fc444f4a9

        SHA1

        249cb0c59c29e0ae8940ce6928cb7e6a1d0e5bb9

        SHA256

        84a1c17937e04bd5090897594950e1aef33acfbbbd675fc7e319d000dfb3110a

        SHA512

        d94ac1f1b118ae5779458392b31375b064894807e0fc6a3fb9cbc67fb8897ba591054235bf6b52dfd21dd964bb3fe6449bfc6049ccb5466046bfe95361d33fbb

      • memory/680-152-0x0000000000550000-0x0000000000650000-memory.dmp

        Filesize

        1024KB

      • memory/680-151-0x0000000000400000-0x000000000041D000-memory.dmp

        Filesize

        116KB

      • memory/680-154-0x0000000000400000-0x000000000041D000-memory.dmp

        Filesize

        116KB

      • memory/840-12-0x0000000000400000-0x00000000004A9000-memory.dmp

        Filesize

        676KB

      • memory/840-13-0x0000000000400000-0x00000000004A9000-memory.dmp

        Filesize

        676KB

      • memory/840-14-0x00000000005F8000-0x000000000061C000-memory.dmp

        Filesize

        144KB

      • memory/1496-153-0x00000000005A0000-0x00000000006A0000-memory.dmp

        Filesize

        1024KB

      • memory/1496-69-0x0000000000400000-0x00000000004A9000-memory.dmp

        Filesize

        676KB

      • memory/1496-70-0x00000000005A0000-0x00000000006A0000-memory.dmp

        Filesize

        1024KB

      • memory/2816-15-0x0000000000400000-0x00000000004A9000-memory.dmp

        Filesize

        676KB

      • memory/2816-72-0x0000000000290000-0x0000000000390000-memory.dmp

        Filesize

        1024KB

      • memory/2816-71-0x0000000000400000-0x00000000004A9000-memory.dmp

        Filesize

        676KB

      • memory/2816-150-0x0000000000400000-0x00000000004A9000-memory.dmp

        Filesize

        676KB

      • memory/2816-1-0x0000000000400000-0x00000000004A9000-memory.dmp

        Filesize

        676KB

      • memory/2816-2-0x0000000000290000-0x0000000000390000-memory.dmp

        Filesize

        1024KB

      • memory/2816-188-0x0000000000400000-0x00000000004A9000-memory.dmp

        Filesize

        676KB

      • memory/2816-189-0x0000000000400000-0x00000000004A9000-memory.dmp

        Filesize

        676KB