Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 01:04
Static task
static1
Behavioral task
behavioral1
Sample
dcdc301ac5ea38ebaa5f3f169240fb19.exe
Resource
win7-20231129-en
General
-
Target
dcdc301ac5ea38ebaa5f3f169240fb19.exe
-
Size
144KB
-
MD5
dcdc301ac5ea38ebaa5f3f169240fb19
-
SHA1
0e54455a90fbee39e5fe5b8dfb148f967b10bdc2
-
SHA256
5e5766aa83b7688d0606ec341dde8699d1fa3c5dcc01c09b7311fbee2e6a2ca9
-
SHA512
929a7011f420d8ef9b28a8a5644d6da2032d1f4278f6c7569d53f13958eb60d2b2b2d774eba3ff0f019f55d4e34f5df60859a14da6b5bf4be45b898e7d6f386c
-
SSDEEP
1536:Le6kLnGPNozBZjxT5epx5xp4lAMl1FA8i4Q8u8tZS/DMQEGtCRc8YtNEMCYq5:LR+3FT8xDprC1F8ejtZW2WCC/8
Malware Config
Extracted
pony
http://98.158.129.17:8080/pony/gate.php
http://50.116.9.68/pony/gate.php
-
payload_url
http://gettingmoreyoutubeviews.info/KHwbi.exe
http://ghanaleakplus.com/KVvCk7B.exe
http://arvina.cz/PpBCye.exe
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
dcdc301ac5ea38ebaa5f3f169240fb19.exedescription pid process Token: SeImpersonatePrivilege 4520 dcdc301ac5ea38ebaa5f3f169240fb19.exe Token: SeTcbPrivilege 4520 dcdc301ac5ea38ebaa5f3f169240fb19.exe Token: SeChangeNotifyPrivilege 4520 dcdc301ac5ea38ebaa5f3f169240fb19.exe Token: SeCreateTokenPrivilege 4520 dcdc301ac5ea38ebaa5f3f169240fb19.exe Token: SeBackupPrivilege 4520 dcdc301ac5ea38ebaa5f3f169240fb19.exe Token: SeRestorePrivilege 4520 dcdc301ac5ea38ebaa5f3f169240fb19.exe Token: SeIncreaseQuotaPrivilege 4520 dcdc301ac5ea38ebaa5f3f169240fb19.exe Token: SeAssignPrimaryTokenPrivilege 4520 dcdc301ac5ea38ebaa5f3f169240fb19.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4520-0-0x00000000008B0000-0x00000000008C7000-memory.dmpFilesize
92KB
-
memory/4520-1-0x00000000008D0000-0x00000000008F7000-memory.dmpFilesize
156KB
-
memory/4520-2-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/4520-5-0x00000000008D0000-0x00000000008F7000-memory.dmpFilesize
156KB
-
memory/4520-6-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB