Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 05:57
Static task
static1
Behavioral task
behavioral1
Sample
dadcbbb2166372ecd1233c3fb9b02b29.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dadcbbb2166372ecd1233c3fb9b02b29.exe
Resource
win10v2004-20240226-en
General
-
Target
dadcbbb2166372ecd1233c3fb9b02b29.exe
-
Size
172KB
-
MD5
dadcbbb2166372ecd1233c3fb9b02b29
-
SHA1
ba534c8f6a9220e408b675de12c4ac908e6db02c
-
SHA256
a99fea064df4def0094b414104da16d4a2cc2ae3bfb6da482c336303a5200814
-
SHA512
d0c9b72a097675705fc1258851d6bdee577b7b7d92091758b6ce42e1772f63dbc97f2bb7d5d6a8e149dabb5aecc2e0c56ba159d4ebe4e7820c92023718663916
-
SSDEEP
3072:jpXww2bG7/Tg2DmffDrbYHHf3xaW3ShYtNYKse9:ehSTTLmfbHe/haMSNKb
Malware Config
Extracted
pony
http://108.166.65.182:8080/pony/gate.php
http://66.150.188.33/pony/gate.php
-
payload_url
http://bgdt.co.uk/2A3.exe
http://madeiras10.com.br/ZNg8uR.exe
http://aencuentro.com.ar/xc25nXp.exe
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
dadcbbb2166372ecd1233c3fb9b02b29.exedescription pid process Token: SeImpersonatePrivilege 3012 dadcbbb2166372ecd1233c3fb9b02b29.exe Token: SeTcbPrivilege 3012 dadcbbb2166372ecd1233c3fb9b02b29.exe Token: SeChangeNotifyPrivilege 3012 dadcbbb2166372ecd1233c3fb9b02b29.exe Token: SeCreateTokenPrivilege 3012 dadcbbb2166372ecd1233c3fb9b02b29.exe Token: SeBackupPrivilege 3012 dadcbbb2166372ecd1233c3fb9b02b29.exe Token: SeRestorePrivilege 3012 dadcbbb2166372ecd1233c3fb9b02b29.exe Token: SeIncreaseQuotaPrivilege 3012 dadcbbb2166372ecd1233c3fb9b02b29.exe Token: SeAssignPrimaryTokenPrivilege 3012 dadcbbb2166372ecd1233c3fb9b02b29.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
dadcbbb2166372ecd1233c3fb9b02b29.exepid process 3012 dadcbbb2166372ecd1233c3fb9b02b29.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3012-2-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/3012-1-0x0000000000270000-0x00000000002A1000-memory.dmpFilesize
196KB
-
memory/3012-0-0x0000000000250000-0x0000000000267000-memory.dmpFilesize
92KB
-
memory/3012-3-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB