Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-02-2024 08:56
Static task
static1
Behavioral task
behavioral1
Sample
a35f8b21348aa8df49f85eb1e11c3bbb.exe
Resource
win7-20240221-en
General
-
Target
a35f8b21348aa8df49f85eb1e11c3bbb.exe
-
Size
144KB
-
MD5
a35f8b21348aa8df49f85eb1e11c3bbb
-
SHA1
4bacced3bc8998de72ff7b00000948dd363d8102
-
SHA256
1e8af1ea2d30b6ebca1f838a9302362f2b866420bc61d774f60ab7b977057522
-
SHA512
6b86171012298b04be849d07b8c64a2379dafc286fc399a8e201163012c6e5a767e227e9c409a8a6b673d70faa8f68f78cbb80b6056af3e64ad0d75db0adcf46
-
SSDEEP
1536:2zCheWuXu1UBhnMKbHR651UmbkPmJBJupQ1IjSxjLAHJW14FZZQa8eKL8jmDmciA:98brw16mfdxgW1IZ38pLjicXatTtb8
Malware Config
Extracted
pony
http://br1.pineapplesdonthavesleeves.com:8080/ponyb/gate.php
http://89.166.50.40:8080/ponyb/gate.php
http://6.magicalomaha.com/ponyb/gate.php
http://6.creepyassstuff.com/ponyb/gate.php
-
payload_url
http://ftp.vandaliamarketplace.com/eZysnrA.exe
http://zonavipbarcelona.com/gsF.exe
http://complianceinbox.bostonfagroup.com/BYNVPi.exe
http://fleetlineltd.com/eDrWpe.exe
http://getprotected.com.au/i7e.exe
http://paymahindra.com/KAYtdhak.exe
http://superslimsummer.com/nBR8.exe
http://comunalis.net/v1Gks.exe
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts a35f8b21348aa8df49f85eb1e11c3bbb.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook a35f8b21348aa8df49f85eb1e11c3bbb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 2120 a35f8b21348aa8df49f85eb1e11c3bbb.exe Token: SeTcbPrivilege 2120 a35f8b21348aa8df49f85eb1e11c3bbb.exe Token: SeChangeNotifyPrivilege 2120 a35f8b21348aa8df49f85eb1e11c3bbb.exe Token: SeCreateTokenPrivilege 2120 a35f8b21348aa8df49f85eb1e11c3bbb.exe Token: SeBackupPrivilege 2120 a35f8b21348aa8df49f85eb1e11c3bbb.exe Token: SeRestorePrivilege 2120 a35f8b21348aa8df49f85eb1e11c3bbb.exe Token: SeIncreaseQuotaPrivilege 2120 a35f8b21348aa8df49f85eb1e11c3bbb.exe Token: SeAssignPrimaryTokenPrivilege 2120 a35f8b21348aa8df49f85eb1e11c3bbb.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2120 a35f8b21348aa8df49f85eb1e11c3bbb.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook a35f8b21348aa8df49f85eb1e11c3bbb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a35f8b21348aa8df49f85eb1e11c3bbb.exe"C:\Users\Admin\AppData\Local\Temp\a35f8b21348aa8df49f85eb1e11c3bbb.exe"1⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- outlook_win_path
PID:2120