Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 18:42
Static task
static1
Behavioral task
behavioral1
Sample
dc581035e34ba6e83a94e7075375be11.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dc581035e34ba6e83a94e7075375be11.exe
Resource
win10v2004-20240226-en
General
-
Target
dc581035e34ba6e83a94e7075375be11.exe
-
Size
130KB
-
MD5
dc581035e34ba6e83a94e7075375be11
-
SHA1
d5d7bfa513597f54304adf14e7b57733090c2168
-
SHA256
9ae0910208533e6afe1824403cdeb03828f0ecf0c47e8de61acf1bc74647b401
-
SHA512
b51bf797f8b19f8c05c8338697bf3cbe9fdd639a33eb921c9d50354acc14cd6a7181412cf0634b6c15feb48b7d5f7e500d4c3ec466b610d574a23e65c664c2a0
-
SSDEEP
3072:1EUvYO6ikpP4h8X5WrZOCGlbSjPXK0DKceVf:KMbGCaYMMXpDKnf
Malware Config
Extracted
pony
http://108.166.65.182:8080/pony/gate.php
http://aloucakbileti.com:8080/pony/gate.php
-
payload_url
http://irelands-escorts.com/D5QDyxF9.exe
http://guiadahora.com.br/8ZLYZor.exe
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
dc581035e34ba6e83a94e7075375be11.exedescription pid process Token: SeImpersonatePrivilege 2752 dc581035e34ba6e83a94e7075375be11.exe Token: SeTcbPrivilege 2752 dc581035e34ba6e83a94e7075375be11.exe Token: SeChangeNotifyPrivilege 2752 dc581035e34ba6e83a94e7075375be11.exe Token: SeCreateTokenPrivilege 2752 dc581035e34ba6e83a94e7075375be11.exe Token: SeBackupPrivilege 2752 dc581035e34ba6e83a94e7075375be11.exe Token: SeRestorePrivilege 2752 dc581035e34ba6e83a94e7075375be11.exe Token: SeIncreaseQuotaPrivilege 2752 dc581035e34ba6e83a94e7075375be11.exe Token: SeAssignPrimaryTokenPrivilege 2752 dc581035e34ba6e83a94e7075375be11.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
dc581035e34ba6e83a94e7075375be11.exepid process 2752 dc581035e34ba6e83a94e7075375be11.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2752-0-0x00000000002D0000-0x00000000002E7000-memory.dmpFilesize
92KB
-
memory/2752-1-0x00000000002F0000-0x0000000000316000-memory.dmpFilesize
152KB
-
memory/2752-2-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/2752-3-0x00000000002F0000-0x0000000000316000-memory.dmpFilesize
152KB
-
memory/2752-4-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB