Analysis
-
max time kernel
108s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 08:55
Static task
static1
Behavioral task
behavioral1
Sample
d0cd94d5eed6a47100778441d4fb7d40N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0cd94d5eed6a47100778441d4fb7d40N.exe
Resource
win10v2004-20240802-en
General
-
Target
d0cd94d5eed6a47100778441d4fb7d40N.exe
-
Size
145KB
-
MD5
d0cd94d5eed6a47100778441d4fb7d40
-
SHA1
f9afaf11ea02aa14dadcd934f9ac8a9d279d737b
-
SHA256
adac4dfe0b302e6ee798116e0aff4fc525017f8533a2af9d097219c561b46754
-
SHA512
8efb179db199c8276ab1194c0fb15698df7ba06442da7749523824a4c1585405ad2d4dd671f87d1191bc516dcc71cef978d4e49b1366059f12d9c4fce972b72c
-
SSDEEP
3072:J9PkUIDgjBuybaYRLw/IM4L9z+sVz2Rydo6fkKXBC1bgfovR9:HH7jlL4IM4Zu6LX0GfovR
Malware Config
Extracted
pony
http://209.59.219.1/forum/viewtopic.php
http://212.58.20.11/forum/viewtopic.php
-
payload_url
http://mobilemonday.hu/pwt.exe
http://ftp.niset.nl/h2Q.exe
http://maximtour.info/ZQFG2BJ.exe
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts d0cd94d5eed6a47100778441d4fb7d40N.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook d0cd94d5eed6a47100778441d4fb7d40N.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 116 set thread context of 3708 116 d0cd94d5eed6a47100778441d4fb7d40N.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0cd94d5eed6a47100778441d4fb7d40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0cd94d5eed6a47100778441d4fb7d40N.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 3708 d0cd94d5eed6a47100778441d4fb7d40N.exe Token: SeTcbPrivilege 3708 d0cd94d5eed6a47100778441d4fb7d40N.exe Token: SeChangeNotifyPrivilege 3708 d0cd94d5eed6a47100778441d4fb7d40N.exe Token: SeCreateTokenPrivilege 3708 d0cd94d5eed6a47100778441d4fb7d40N.exe Token: SeBackupPrivilege 3708 d0cd94d5eed6a47100778441d4fb7d40N.exe Token: SeRestorePrivilege 3708 d0cd94d5eed6a47100778441d4fb7d40N.exe Token: SeIncreaseQuotaPrivilege 3708 d0cd94d5eed6a47100778441d4fb7d40N.exe Token: SeAssignPrimaryTokenPrivilege 3708 d0cd94d5eed6a47100778441d4fb7d40N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 116 wrote to memory of 3708 116 d0cd94d5eed6a47100778441d4fb7d40N.exe 91 PID 116 wrote to memory of 3708 116 d0cd94d5eed6a47100778441d4fb7d40N.exe 91 PID 116 wrote to memory of 3708 116 d0cd94d5eed6a47100778441d4fb7d40N.exe 91 PID 116 wrote to memory of 3708 116 d0cd94d5eed6a47100778441d4fb7d40N.exe 91 PID 116 wrote to memory of 3708 116 d0cd94d5eed6a47100778441d4fb7d40N.exe 91 PID 116 wrote to memory of 3708 116 d0cd94d5eed6a47100778441d4fb7d40N.exe 91 PID 116 wrote to memory of 3708 116 d0cd94d5eed6a47100778441d4fb7d40N.exe 91 PID 116 wrote to memory of 3708 116 d0cd94d5eed6a47100778441d4fb7d40N.exe 91 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook d0cd94d5eed6a47100778441d4fb7d40N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0cd94d5eed6a47100778441d4fb7d40N.exe"C:\Users\Admin\AppData\Local\Temp\d0cd94d5eed6a47100778441d4fb7d40N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\d0cd94d5eed6a47100778441d4fb7d40N.exe"C:\Users\Admin\AppData\Local\Temp\d0cd94d5eed6a47100778441d4fb7d40N.exe"2⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
PID:3708
-