Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 21:21
Static task
static1
Behavioral task
behavioral1
Sample
df4e82a5be6546a9ca71d242e0e9d494.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df4e82a5be6546a9ca71d242e0e9d494.exe
Resource
win10v2004-20240802-en
General
-
Target
df4e82a5be6546a9ca71d242e0e9d494.exe
-
Size
129KB
-
MD5
df4e82a5be6546a9ca71d242e0e9d494
-
SHA1
1dc7522dabd2fbb463bc0daeef5d38d7e0a00203
-
SHA256
8aa8f23f89f3a57be3cec208e6d1627b537aa28a727a6819293d8328efd98dc8
-
SHA512
8fbb55faf11d8c63a29a2fe0cd7bb4939115027e841026337bcd47e76fa59deb61d907ff1eb703f3fd774f03331ea823600096dfb7f87fed953ecce2287c33d4
-
SSDEEP
3072:UOn16mg2zg/zusI1xIojIkZ8PVy3idfDXd/:DTpsInfkkKPVy3i1
Malware Config
Extracted
pony
http://67.215.225.205:8080/forum/viewtopic.php
http://96.47.0.171/forum/viewtopic.php
-
payload_url
http://fuerzav.vectorialstudios.com/4Gxf.exe
http://fuszerboltom.hu/Hd0.exe
http://successwithmichael.com/Dj8vftG.exe
http://castgroup.gr/fwu4.exe
http://piscinasangra.com/oP3yge.exe
http://p933.phpnet.org/0uVk8W2Z.exe
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df4e82a5be6546a9ca71d242e0e9d494.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2816 1364 df4e82a5be6546a9ca71d242e0e9d494.exe 30 PID 1364 wrote to memory of 2816 1364 df4e82a5be6546a9ca71d242e0e9d494.exe 30 PID 1364 wrote to memory of 2816 1364 df4e82a5be6546a9ca71d242e0e9d494.exe 30 PID 1364 wrote to memory of 2816 1364 df4e82a5be6546a9ca71d242e0e9d494.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\df4e82a5be6546a9ca71d242e0e9d494.exe"C:\Users\Admin\AppData\Local\Temp\df4e82a5be6546a9ca71d242e0e9d494.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\df4e82a5be6546a9ca71d242e0e9d494.exe"C:\Users\Admin\AppData\Local\Temp\df4e82a5be6546a9ca71d242e0e9d494.exe"2⤵PID:2816
-