Analysis

  • max time kernel
    142s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-03-2024 00:43

General

  • Target

    dcd19eee4fabb093e3e5fd6ed05c845c.exe

  • Size

    283KB

  • MD5

    dcd19eee4fabb093e3e5fd6ed05c845c

  • SHA1

    b0c6823a142435c8f20455c83797b820a4bff5d2

  • SHA256

    ce1b526bd03a7d5dd0c4d5803ae9c3c881de4f2229cae4e6c01d07c81b2a6541

  • SHA512

    84d6cdb4bba43c5e10dc963e3b106d002d14b495c40f7dd02ce560d2d53ed4eef696849eac437dc38f2431f70b7388e91f3611a169384c82d88c755d192c4d67

  • SSDEEP

    6144:y/aIitjKYKKiYkuKcuuiRahdoZ1oiAcYS+U7MyXP2R0:yiIitGPuKcniYhdoZ1gRSL7dP2

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Disables taskbar notifications via registry modification
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 3 IoCs
  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcd19eee4fabb093e3e5fd6ed05c845c.exe
    "C:\Users\Admin\AppData\Local\Temp\dcd19eee4fabb093e3e5fd6ed05c845c.exe"
    1⤵
    • Modifies security service
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2280
    • C:\Users\Admin\AppData\Local\Temp\dcd19eee4fabb093e3e5fd6ed05c845c.exe
      C:\Users\Admin\AppData\Local\Temp\dcd19eee4fabb093e3e5fd6ed05c845c.exe startC:\Users\Admin\AppData\Roaming\6FD66\CFEF2.exe%C:\Users\Admin\AppData\Roaming\6FD66
      2⤵
        PID:1796
      • C:\Users\Admin\AppData\Local\Temp\dcd19eee4fabb093e3e5fd6ed05c845c.exe
        C:\Users\Admin\AppData\Local\Temp\dcd19eee4fabb093e3e5fd6ed05c845c.exe startC:\Program Files (x86)\6638E\lvvm.exe%C:\Program Files (x86)\6638E
        2⤵
          PID:872
        • C:\Program Files (x86)\LP\F2E6\89C9.tmp
          "C:\Program Files (x86)\LP\F2E6\89C9.tmp"
          2⤵
          • Executes dropped EXE
          PID:1352
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2652
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1396

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Create or Modify System Process

      1
      T1543

      Windows Service

      1
      T1543.003

      Boot or Logon Autostart Execution

      2
      T1547

      Registry Run Keys / Startup Folder

      2
      T1547.001

      Privilege Escalation

      Create or Modify System Process

      1
      T1543

      Windows Service

      1
      T1543.003

      Boot or Logon Autostart Execution

      2
      T1547

      Registry Run Keys / Startup Folder

      2
      T1547.001

      Defense Evasion

      Modify Registry

      5
      T1112

      Subvert Trust Controls

      1
      T1553

      Install Root Certificate

      1
      T1553.004

      Credential Access

      Unsecured Credentials

      2
      T1552

      Credentials In Files

      2
      T1552.001

      Discovery

      Query Registry

      2
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Cab85B6.tmp
        Filesize

        67KB

        MD5

        753df6889fd7410a2e9fe333da83a429

        SHA1

        3c425f16e8267186061dd48ac1c77c122962456e

        SHA256

        b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

        SHA512

        9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

      • C:\Users\Admin\AppData\Local\Temp\Tar85C9.tmp
        Filesize

        175KB

        MD5

        dd73cead4b93366cf3465c8cd32e2796

        SHA1

        74546226dfe9ceb8184651e920d1dbfb432b314e

        SHA256

        a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

        SHA512

        ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

      • C:\Users\Admin\AppData\Roaming\6FD66\638E.FD6
        Filesize

        1KB

        MD5

        541dcc2436d4474a37289d9b7b17ccdc

        SHA1

        cc6c3762b91fccc189a8a9176b988b4d08a5577e

        SHA256

        6caad5795727738fd99b139e410839f9ce5c4bea37422cdb98498aed4d8b8fda

        SHA512

        dbc6b2358be7e0d93d037651149b51f7c1160537e620f50babda077f863766b72442c627340a1805dd1bd87eb9eaaa2ad3fcbb5a4c66ab0baf3b2162a32b9c8a

      • C:\Users\Admin\AppData\Roaming\6FD66\638E.FD6
        Filesize

        996B

        MD5

        e22f64cb316e5a5d8d77b02728213ab1

        SHA1

        268238f590bbde02a0e785530fa9311f9608e4fb

        SHA256

        263324d70dc127ceaaa5ebf581624e711c65de0ccc393e79b0749e9a475afe55

        SHA512

        3dd3a161f4dcfecba90732740ca7e2ec98b1a690c71f5d88024d6300895c1420af89275105d7b22bd3f721f58429bdca7949d4144ce419a3ac80946d16094cb7

      • C:\Users\Admin\AppData\Roaming\6FD66\638E.FD6
        Filesize

        600B

        MD5

        972d26efe4d0ae89692f3d8ebc279023

        SHA1

        8a2dcbdc4037aef90419ecd9ca728b440e774f80

        SHA256

        eed2caae94ac2c569fbd8bd856a73391353e4618ce49fd747e8c40ea724b20f4

        SHA512

        c47bb195f19f4186d33d56e8b61c60915b4f49aff60630e6627a3d40e34085e9137658fcd77737e73f7aa460b9f40e4e8352577e83cad64369812f0af7326d0b

      • \Program Files (x86)\LP\F2E6\89C9.tmp
        Filesize

        99KB

        MD5

        9d83b6d4629b9d0e96bbdb171b0dc5db

        SHA1

        e9bed14c44fe554e0e8385096bbacca494da30b1

        SHA256

        d3a6060ff059a7724a483d82025a9231a61143839b633a6d3842a58ccb5a7d7d

        SHA512

        301187bdcab5ca9942b2c7b7114e37e53e58b5661eef50c389622950d7691993a29f5a825132cf499ca73cdb6637d3f58afdc024cb04fac2b8e01f752209572c

      • memory/872-85-0x0000000000470000-0x00000000004B8000-memory.dmp
        Filesize

        288KB

      • memory/872-83-0x0000000000400000-0x000000000046C000-memory.dmp
        Filesize

        432KB

      • memory/1352-198-0x0000000000400000-0x000000000041C000-memory.dmp
        Filesize

        112KB

      • memory/1352-196-0x0000000000400000-0x000000000041C000-memory.dmp
        Filesize

        112KB

      • memory/1352-197-0x00000000002D0000-0x00000000003D0000-memory.dmp
        Filesize

        1024KB

      • memory/1396-114-0x0000000004430000-0x0000000004431000-memory.dmp
        Filesize

        4KB

      • memory/1396-202-0x0000000004430000-0x0000000004431000-memory.dmp
        Filesize

        4KB

      • memory/1796-13-0x0000000000400000-0x000000000046C000-memory.dmp
        Filesize

        432KB

      • memory/1796-14-0x0000000000400000-0x000000000046C000-memory.dmp
        Filesize

        432KB

      • memory/1796-15-0x0000000001FF0000-0x0000000002038000-memory.dmp
        Filesize

        288KB

      • memory/2280-81-0x0000000000400000-0x000000000046C000-memory.dmp
        Filesize

        432KB

      • memory/2280-2-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/2280-180-0x0000000000400000-0x000000000046C000-memory.dmp
        Filesize

        432KB

      • memory/2280-200-0x0000000000400000-0x000000000046C000-memory.dmp
        Filesize

        432KB

      • memory/2280-84-0x0000000000470000-0x0000000000570000-memory.dmp
        Filesize

        1024KB

      • memory/2280-204-0x0000000000400000-0x000000000046C000-memory.dmp
        Filesize

        432KB

      • memory/2280-11-0x0000000000400000-0x000000000046C000-memory.dmp
        Filesize

        432KB

      • memory/2280-1-0x0000000000400000-0x000000000046C000-memory.dmp
        Filesize

        432KB

      • memory/2280-244-0x0000000000400000-0x000000000046C000-memory.dmp
        Filesize

        432KB