Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    29-05-2024 21:51

General

  • Target

    Total order confirmation April 10 2017.exe

  • Size

    1.5MB

  • MD5

    d31daa3adb9285b7024438799d3a7fc8

  • SHA1

    3a4a3684c7a475bae5b47aad1ad750996add764b

  • SHA256

    ebdb910c35ce8b21168a4bda0dae16b3a64f66670763be89a81e322d8ddab431

  • SHA512

    9d3febe2e0603e0f6d040dff42b194fa2be309260724f9bfc879fd72990718145a239a6817b8fbcf1fd1c2e3209896c94282fc88e9bc61d064b393f0b271d8dc

  • SSDEEP

    49152:41wV28FzbXmsC/C2d4A7k5r3HN2i54kZW:VVvFzisC/r4UkJ3HN2i54mW

Malware Config

Extracted

Family

pony

C2

http://tcoolonline.mobi/wp-includes/css/Panel/gate.php

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Luminosity 2 IoCs

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Total order confirmation April 10 2017.exe
    "C:\Users\Admin\AppData\Local\Temp\Total order confirmation April 10 2017.exe"
    1⤵
    • Luminosity
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Roaming\datalog.exe
      "C:\Users\Admin\AppData\Roaming\datalog.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn "Client Monitor" /tr "'C:\Program Files (x86)\Client\client.exe' /startup" /sc MINUTE /f /rl highest
        3⤵
        • Luminosity
        • Creates scheduled task(s)
        PID:308
      • C:\Windows\SysWOW64\REG.exe
        REG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:64
        3⤵
        • Adds Run key to start application
        PID:1564
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Users\Admin\AppData\Roaming\datalog.exe
        "C:\Users\Admin\AppData\Roaming\datalog.exe"
        3⤵
        • Executes dropped EXE
        PID:2888
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe "
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook accounts
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • outlook_win_path
        PID:2936
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\259411410.bat" "C:\Users\Admin\AppData\Roaming\svchost.exe" "
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1304
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {A7DD7787-1C2A-4869-8BEA-77510E9072F1} S-1-5-21-2721934792-624042501-2768869379-1000:BISMIZHX\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Program Files (x86)\Client\client.exe
      "C:\Program Files (x86)\Client\client.exe" /startup
      2⤵
      • Executes dropped EXE
      PID:1124
    • C:\Program Files (x86)\Client\client.exe
      "C:\Program Files (x86)\Client\client.exe" /startup
      2⤵
      • Executes dropped EXE
      PID:2856

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5
    Filesize

    471B

    MD5

    c9dde86d6bfb98eb2d25af219d46850b

    SHA1

    bc3564b7c2bc11cef1f7aafcb91f973e26fea135

    SHA256

    e26cf32e2cc2bfb472aeea14b1428b760f95fc17117204f146187bf3b8fa4144

    SHA512

    43e3b7b52493bd161b3d30719e1c0838b1f8b14c1b5e4ad51c5f113cbe4d4c470c2e0e81ed1abe32a006e029c1479aae483f0d7b81d8a50c11e3077edf0c5d52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\66AE3BFDF94A732B262342AD2154B86E_502BB733848926DD3139F2342144B39C
    Filesize

    471B

    MD5

    c1bc7e4db392d902cd4b515212ff9be0

    SHA1

    98f5a2248d77fe52f276bfe1c6108ef957b11667

    SHA256

    c53628b25e94add0515b21957043d73f9d80bf0a6ac6c96149c3e6c7abd1e1f6

    SHA512

    75294a9aff66e69adf6abbcde303e1fc6034f23999dee152ed6775a57934b128424f47e979d0d7e32f61873560208f6662c6f93f59f069727731b7d914251b60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5
    Filesize

    404B

    MD5

    1a78d816ee3b89aa24007117fca5d316

    SHA1

    54dd9fa8615eb2b509bed890e817e1158e32ada8

    SHA256

    8e141d8b69e5d3113859409922f0affa70ada9f1c84d7c624420a725b4436d2c

    SHA512

    fc20139971dfa59d7bdc66856118f73f4e7b3df9fae3181c2a6fa9204cbf44f1f854d98a495837e3b0393bca863672448d7d8c6fd3bb2d2f11095c07a497bcb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\66AE3BFDF94A732B262342AD2154B86E_502BB733848926DD3139F2342144B39C
    Filesize

    404B

    MD5

    9f6966dfa851a13661820435214d4327

    SHA1

    ef3a0f54e46f2d38b977c5b1a602c442f5b2e3fe

    SHA256

    fd5dfa699381a569f1e5109eb97a653bc59b36dea2d2141ec0e48a912efae2f3

    SHA512

    98a9438a7422a277cfc36492e0c94f225d241b79d93ea4b7c643003394ac17b202aba741ff8bdb2dc0125c671dddf64ed3aef916a3934374a34625b3a86fae2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    d1b9aed9b16f48b374169331d8c0349f

    SHA1

    f3d891ea070c249d48420c81b07dcd707f41ae44

    SHA256

    8f00948cf41e4a26af8f1d5e3df8b15ec4c746d535d7193b6ff8e71b61aa249d

    SHA512

    20bd36dd0bf260aeb8c42ee5602d0703443f1d5f45329c47fd6fc536fbb738afc2323c4a1462188a34e868f1de8fec22a69d6b20744e8d74dcb64fd5495f98cd

  • C:\Users\Admin\AppData\Local\Temp\259411410.bat
    Filesize

    94B

    MD5

    3880eeb1c736d853eb13b44898b718ab

    SHA1

    4eec9d50360cd815211e3c4e6bdd08271b6ec8e6

    SHA256

    936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7

    SHA512

    3eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b

  • C:\Users\Admin\AppData\Local\Temp\Tar2405.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\svchost.exe
    Filesize

    1.5MB

    MD5

    d31daa3adb9285b7024438799d3a7fc8

    SHA1

    3a4a3684c7a475bae5b47aad1ad750996add764b

    SHA256

    ebdb910c35ce8b21168a4bda0dae16b3a64f66670763be89a81e322d8ddab431

    SHA512

    9d3febe2e0603e0f6d040dff42b194fa2be309260724f9bfc879fd72990718145a239a6817b8fbcf1fd1c2e3209896c94282fc88e9bc61d064b393f0b271d8dc

  • \Users\Admin\AppData\Roaming\datalog.exe
    Filesize

    856KB

    MD5

    6f354cc37a8d6f4c0f2a252ca5830275

    SHA1

    f4f42bccbb5f3ae12e807fae97986e138d1b405d

    SHA256

    c76034635528117e1b8b59c9c549a58c17b2f63f13b0d92b015f462c38317942

    SHA512

    19f1ca7a911acd944f985c1b043cd9914633bf97d420064a5ed5baa9efff8cbb4721797ed27b4354e5912d2be2bfde690d2fa2faf28e4181bf0612c41446dc3f

  • memory/1304-128-0x0000000000170000-0x0000000000187000-memory.dmp
    Filesize

    92KB

  • memory/1304-120-0x0000000000170000-0x0000000000187000-memory.dmp
    Filesize

    92KB

  • memory/1304-122-0x0000000000170000-0x0000000000187000-memory.dmp
    Filesize

    92KB

  • memory/1304-124-0x0000000000170000-0x0000000000187000-memory.dmp
    Filesize

    92KB

  • memory/1304-127-0x0000000000190000-0x0000000000191000-memory.dmp
    Filesize

    4KB

  • memory/2364-2-0x0000000074ED0000-0x000000007547B000-memory.dmp
    Filesize

    5.7MB

  • memory/2364-1-0x0000000074ED0000-0x000000007547B000-memory.dmp
    Filesize

    5.7MB

  • memory/2364-62-0x0000000074ED0000-0x000000007547B000-memory.dmp
    Filesize

    5.7MB

  • memory/2364-0-0x0000000074ED1000-0x0000000074ED2000-memory.dmp
    Filesize

    4KB

  • memory/2536-112-0x0000000000550000-0x0000000000567000-memory.dmp
    Filesize

    92KB

  • memory/2536-115-0x0000000000570000-0x0000000000571000-memory.dmp
    Filesize

    4KB

  • memory/2536-142-0x0000000000550000-0x0000000000567000-memory.dmp
    Filesize

    92KB

  • memory/2536-116-0x0000000000550000-0x0000000000567000-memory.dmp
    Filesize

    92KB

  • memory/2536-108-0x0000000000550000-0x0000000000567000-memory.dmp
    Filesize

    92KB

  • memory/2536-110-0x0000000000550000-0x0000000000567000-memory.dmp
    Filesize

    92KB

  • memory/2704-130-0x0000000074ED0000-0x000000007547B000-memory.dmp
    Filesize

    5.7MB

  • memory/2704-51-0x0000000074ED0000-0x000000007547B000-memory.dmp
    Filesize

    5.7MB

  • memory/2704-61-0x0000000074ED0000-0x000000007547B000-memory.dmp
    Filesize

    5.7MB

  • memory/2704-60-0x0000000074ED0000-0x000000007547B000-memory.dmp
    Filesize

    5.7MB

  • memory/2936-81-0x0000000000400000-0x000000000041D000-memory.dmp
    Filesize

    116KB

  • memory/2936-85-0x0000000000140000-0x0000000000157000-memory.dmp
    Filesize

    92KB

  • memory/2936-104-0x0000000000140000-0x0000000000157000-memory.dmp
    Filesize

    92KB

  • memory/2936-84-0x0000000000140000-0x0000000000157000-memory.dmp
    Filesize

    92KB

  • memory/2936-94-0x0000000000140000-0x0000000000157000-memory.dmp
    Filesize

    92KB

  • memory/2936-82-0x0000000000400000-0x000000000041D000-memory.dmp
    Filesize

    116KB

  • memory/2936-79-0x0000000000400000-0x000000000041D000-memory.dmp
    Filesize

    116KB

  • memory/2936-88-0x0000000000140000-0x0000000000157000-memory.dmp
    Filesize

    92KB

  • memory/2936-90-0x0000000000140000-0x0000000000157000-memory.dmp
    Filesize

    92KB

  • memory/2936-91-0x00000000000F0000-0x00000000000F1000-memory.dmp
    Filesize

    4KB

  • memory/2936-93-0x00000000000F0000-0x00000000000F1000-memory.dmp
    Filesize

    4KB

  • memory/2936-86-0x0000000000140000-0x0000000000157000-memory.dmp
    Filesize

    92KB