Behavioral task
behavioral1
Sample
cec9aca3fbeb327da9fef0e45b5fde14cf418e6efe43f7d24e1ea1a4b512d0a9.exe
Resource
win7-20240220-en
General
-
Target
cec9aca3fbeb327da9fef0e45b5fde14cf418e6efe43f7d24e1ea1a4b512d0a9.exe
-
Size
104KB
-
MD5
a7bf3100ca96672c6e6106da6d13938b
-
SHA1
314bc39647b3efdc5eebe3a60d23cb7978532490
-
SHA256
cec9aca3fbeb327da9fef0e45b5fde14cf418e6efe43f7d24e1ea1a4b512d0a9
-
SHA512
dbb6b289c3326b726f0f6cb0d2f34bcaaa2f7da41412ad307b8bfea394da0fbf00a1853949a2df9fd0be89935c1b728cf3194fc4d053d620b739f1db0c0d244f
-
SSDEEP
1536:cXR7yfMqTeziUiwFowdlte3/OW4fCSW0YODyipGTvLETePX2kzmc:sRkfUrFVAvHOeiaETeP2c
Malware Config
Extracted
pony
http://www.techlift.com.my/jsjs/gate.php
Signatures
-
Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients -
Pony family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cec9aca3fbeb327da9fef0e45b5fde14cf418e6efe43f7d24e1ea1a4b512d0a9.exe
Files
-
cec9aca3fbeb327da9fef0e45b5fde14cf418e6efe43f7d24e1ea1a4b512d0a9.exe.exe windows:4 windows x86 arch:x86
17768dcb451276f3d0539455414972b2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
ReadFile
CloseHandle
WriteFile
lstrlenA
GlobalLock
GlobalUnlock
LocalFree
LocalAlloc
GetTickCount
lstrcpyA
lstrcatA
GetFileAttributesA
ExpandEnvironmentStringsA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
LoadLibraryA
GetProcAddress
GetTempPathA
CreateDirectoryA
DeleteFileA
GetCurrentProcess
WideCharToMultiByte
GetLastError
lstrcmpA
CreateToolhelp32Snapshot
Process32First
OpenProcess
Process32Next
FindFirstFileA
lstrcmpiA
FindNextFileA
FindClose
GetModuleHandleA
GetVersionExA
GetLocaleInfoA
GetSystemInfo
GetWindowsDirectoryA
GetPrivateProfileStringA
SetCurrentDirectoryA
GetPrivateProfileSectionNamesA
GetPrivateProfileIntA
GetCurrentDirectoryA
lstrlenW
MultiByteToWideChar
Sleep
GetModuleFileNameA
LCMapStringA
ExitProcess
ole32
CreateStreamOnHGlobal
GetHGlobalFromStream
CoCreateGuid
CoTaskMemFree
CoCreateInstance
OleInitialize
user32
wsprintfA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
RegEnumKeyExA
RegCreateKeyA
RegSetValueExA
IsTextUnicode
RegOpenCurrentUser
RegEnumValueA
GetUserNameA
wininet
InternetCrackUrlA
InternetCreateUrlA
shlwapi
StrStrIA
StrRChrIA
StrToIntA
StrStrA
StrCmpNIA
StrStrIW
wsock32
inet_addr
gethostbyname
socket
connect
closesocket
send
select
recv
setsockopt
WSAStartup
userenv
LoadUserProfileA
UnloadUserProfile
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE