Analysis
-
max time kernel
109s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 13:02
Static task
static1
Behavioral task
behavioral1
Sample
d088a5d6d863ce392960ca3be1f221d0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d088a5d6d863ce392960ca3be1f221d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d088a5d6d863ce392960ca3be1f221d0N.exe
-
Size
129KB
-
MD5
d088a5d6d863ce392960ca3be1f221d0
-
SHA1
ed4abeca2ab95865dcb4fe15547e10bb3a8a70f4
-
SHA256
fb3c8bc0a2e39ae1a0cdcfc039a954c9cb99dc8b6a75b874db37a8042ca74230
-
SHA512
b6ffce6dad310cf2551640278e02a176732e8f0213dbdccfcf41867ac973626ac89973165a5e1416eb0f18adddba21736d2bf5d73380bba12843c705978ff097
-
SSDEEP
1536:UUBiFqtXmPmgC9TcvLci0wLOQqOZD03XuCLMw+ucYmOI3JVgRY4ecRmBCaOD9RMi:UOn16mg2TW9vOy+nuq4DVkr3R/jrMf
Malware Config
Extracted
pony
http://67.215.225.205:8080/forum/viewtopic.php
http://66.175.215.102/forum/viewtopic.php
-
payload_url
http://www.drachenboot-strausberg.de/rgbykPm.exe
http://realitycoaching.es/23sf.exe
http://kms-anwaelte.de/mvCo.exe
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts d088a5d6d863ce392960ca3be1f221d0N.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook d088a5d6d863ce392960ca3be1f221d0N.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2528 set thread context of 1784 2528 d088a5d6d863ce392960ca3be1f221d0N.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d088a5d6d863ce392960ca3be1f221d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d088a5d6d863ce392960ca3be1f221d0N.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 1784 d088a5d6d863ce392960ca3be1f221d0N.exe Token: SeTcbPrivilege 1784 d088a5d6d863ce392960ca3be1f221d0N.exe Token: SeChangeNotifyPrivilege 1784 d088a5d6d863ce392960ca3be1f221d0N.exe Token: SeCreateTokenPrivilege 1784 d088a5d6d863ce392960ca3be1f221d0N.exe Token: SeBackupPrivilege 1784 d088a5d6d863ce392960ca3be1f221d0N.exe Token: SeRestorePrivilege 1784 d088a5d6d863ce392960ca3be1f221d0N.exe Token: SeIncreaseQuotaPrivilege 1784 d088a5d6d863ce392960ca3be1f221d0N.exe Token: SeAssignPrimaryTokenPrivilege 1784 d088a5d6d863ce392960ca3be1f221d0N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1784 2528 d088a5d6d863ce392960ca3be1f221d0N.exe 92 PID 2528 wrote to memory of 1784 2528 d088a5d6d863ce392960ca3be1f221d0N.exe 92 PID 2528 wrote to memory of 1784 2528 d088a5d6d863ce392960ca3be1f221d0N.exe 92 PID 2528 wrote to memory of 1784 2528 d088a5d6d863ce392960ca3be1f221d0N.exe 92 PID 2528 wrote to memory of 1784 2528 d088a5d6d863ce392960ca3be1f221d0N.exe 92 PID 2528 wrote to memory of 1784 2528 d088a5d6d863ce392960ca3be1f221d0N.exe 92 PID 2528 wrote to memory of 1784 2528 d088a5d6d863ce392960ca3be1f221d0N.exe 92 PID 2528 wrote to memory of 1784 2528 d088a5d6d863ce392960ca3be1f221d0N.exe 92 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook d088a5d6d863ce392960ca3be1f221d0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d088a5d6d863ce392960ca3be1f221d0N.exe"C:\Users\Admin\AppData\Local\Temp\d088a5d6d863ce392960ca3be1f221d0N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\d088a5d6d863ce392960ca3be1f221d0N.exe"C:\Users\Admin\AppData\Local\Temp\d088a5d6d863ce392960ca3be1f221d0N.exe"2⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
PID:1784
-