Analysis
-
max time kernel
170s -
max time network
182s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-03-2024 08:45
Static task
static1
Behavioral task
behavioral1
Sample
b85186b5f5af8c4cecf9463c669517f1.exe
Resource
win7-20240221-en
General
-
Target
b85186b5f5af8c4cecf9463c669517f1.exe
-
Size
128KB
-
MD5
b85186b5f5af8c4cecf9463c669517f1
-
SHA1
bc625f7baa7622a055d3051f604f0632ccf8dd3f
-
SHA256
009ae25ba1aafd6118c761fad3036373cd713da91d52c0d427a912213ba7851a
-
SHA512
ea70e6937b87583fdf0e5d865b5bee04138363d509fa01674e046ba3659c510eda0bcba23f74f1083be0c62493233933dfb265f4eebe05a7eb7a60ac44ddc3c5
-
SSDEEP
3072:2idTTNCBbjh3iGkDqn78ziYIvgrIcI1hPbF6:2wNCyGZngz/2pcI1hbF
Malware Config
Extracted
pony
http://74.91.112.81/forum/viewtopic.php
http://50.116.36.127/forum/viewtopic.php
-
payload_url
http://birdofparadisepub.com/poQYPP.exe
http://www.carddebtgone.com/NW6.exe
http://capital-marketing.me/yqMb.exe
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts b85186b5f5af8c4cecf9463c669517f1.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook b85186b5f5af8c4cecf9463c669517f1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2740 set thread context of 2916 2740 b85186b5f5af8c4cecf9463c669517f1.exe 27 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 2916 b85186b5f5af8c4cecf9463c669517f1.exe Token: SeTcbPrivilege 2916 b85186b5f5af8c4cecf9463c669517f1.exe Token: SeChangeNotifyPrivilege 2916 b85186b5f5af8c4cecf9463c669517f1.exe Token: SeCreateTokenPrivilege 2916 b85186b5f5af8c4cecf9463c669517f1.exe Token: SeBackupPrivilege 2916 b85186b5f5af8c4cecf9463c669517f1.exe Token: SeRestorePrivilege 2916 b85186b5f5af8c4cecf9463c669517f1.exe Token: SeIncreaseQuotaPrivilege 2916 b85186b5f5af8c4cecf9463c669517f1.exe Token: SeAssignPrimaryTokenPrivilege 2916 b85186b5f5af8c4cecf9463c669517f1.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2916 2740 b85186b5f5af8c4cecf9463c669517f1.exe 27 PID 2740 wrote to memory of 2916 2740 b85186b5f5af8c4cecf9463c669517f1.exe 27 PID 2740 wrote to memory of 2916 2740 b85186b5f5af8c4cecf9463c669517f1.exe 27 PID 2740 wrote to memory of 2916 2740 b85186b5f5af8c4cecf9463c669517f1.exe 27 PID 2740 wrote to memory of 2916 2740 b85186b5f5af8c4cecf9463c669517f1.exe 27 PID 2740 wrote to memory of 2916 2740 b85186b5f5af8c4cecf9463c669517f1.exe 27 PID 2740 wrote to memory of 2916 2740 b85186b5f5af8c4cecf9463c669517f1.exe 27 PID 2740 wrote to memory of 2916 2740 b85186b5f5af8c4cecf9463c669517f1.exe 27 PID 2740 wrote to memory of 2916 2740 b85186b5f5af8c4cecf9463c669517f1.exe 27 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook b85186b5f5af8c4cecf9463c669517f1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b85186b5f5af8c4cecf9463c669517f1.exe"C:\Users\Admin\AppData\Local\Temp\b85186b5f5af8c4cecf9463c669517f1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\b85186b5f5af8c4cecf9463c669517f1.exe"C:\Users\Admin\AppData\Local\Temp\b85186b5f5af8c4cecf9463c669517f1.exe"2⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
PID:2916
-