Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe
Resource
win10v2004-20240802-en
General
-
Target
64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe
-
Size
684KB
-
MD5
f30b5469b217401922b630a70c0d6b25
-
SHA1
8c3f8b0dd9f522265ddebe063a0f03d8ffbd5c06
-
SHA256
64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a
-
SHA512
608c86e693c6ec756f3224eba7667fb66b2f78f116c4574647d3a490ee1c95b4fa23e1bf7529a5a8471bc966c909bb43d943cc32da61ce875899300cccf703c5
-
SSDEEP
12288:+rem0ZUDEB8K1GFvzGJ5AB53hzwGCa4IE7CEB8K1GFvzGJ5AB53hzwGCa4IE7H:0+UYebzGLABTzwDx7RebzGLABTzwDx7H
Malware Config
Extracted
pony
http://godhelpusthisyear.biz/wordpress/wp-admin/blacker/php/gate.php
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 3 IoCs
pid Process 2080 FB_ABF8.tmp.exe 2276 FB_AC66.tmp.exe 2912 imyxk.exe -
Loads dropped DLL 6 IoCs
pid Process 1816 iexplore.exe 1816 iexplore.exe 1816 iexplore.exe 1816 iexplore.exe 2080 FB_ABF8.tmp.exe 2080 FB_ABF8.tmp.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x00070000000192f0-13.dat upx behavioral1/memory/2276-20-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/2276-452-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/2276-484-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts FB_AC66.tmp.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook FB_AC66.tmp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\{14A00B50-7ACA-2653-3F08-ADCFE5BCAEE8} = "C:\\Users\\Admin\\AppData\\Roaming\\Okefxi\\imyxk.exe" imyxk.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2612 set thread context of 1816 2612 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 30 PID 2080 set thread context of 2724 2080 FB_ABF8.tmp.exe 35 PID 2276 set thread context of 1652 2276 FB_AC66.tmp.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB_ABF8.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB_AC66.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Privacy FB_ABF8.tmp.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" FB_ABF8.tmp.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\16422F72-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe 2912 imyxk.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeSecurityPrivilege 2080 FB_ABF8.tmp.exe Token: SeImpersonatePrivilege 2276 FB_AC66.tmp.exe Token: SeTcbPrivilege 2276 FB_AC66.tmp.exe Token: SeChangeNotifyPrivilege 2276 FB_AC66.tmp.exe Token: SeCreateTokenPrivilege 2276 FB_AC66.tmp.exe Token: SeBackupPrivilege 2276 FB_AC66.tmp.exe Token: SeRestorePrivilege 2276 FB_AC66.tmp.exe Token: SeIncreaseQuotaPrivilege 2276 FB_AC66.tmp.exe Token: SeAssignPrimaryTokenPrivilege 2276 FB_AC66.tmp.exe Token: SeSecurityPrivilege 2080 FB_ABF8.tmp.exe Token: SeSecurityPrivilege 2080 FB_ABF8.tmp.exe Token: SeManageVolumePrivilege 2732 WinMail.exe Token: SeImpersonatePrivilege 2276 FB_AC66.tmp.exe Token: SeTcbPrivilege 2276 FB_AC66.tmp.exe Token: SeChangeNotifyPrivilege 2276 FB_AC66.tmp.exe Token: SeCreateTokenPrivilege 2276 FB_AC66.tmp.exe Token: SeBackupPrivilege 2276 FB_AC66.tmp.exe Token: SeRestorePrivilege 2276 FB_AC66.tmp.exe Token: SeIncreaseQuotaPrivilege 2276 FB_AC66.tmp.exe Token: SeAssignPrimaryTokenPrivilege 2276 FB_AC66.tmp.exe Token: SeImpersonatePrivilege 2276 FB_AC66.tmp.exe Token: SeTcbPrivilege 2276 FB_AC66.tmp.exe Token: SeChangeNotifyPrivilege 2276 FB_AC66.tmp.exe Token: SeCreateTokenPrivilege 2276 FB_AC66.tmp.exe Token: SeBackupPrivilege 2276 FB_AC66.tmp.exe Token: SeRestorePrivilege 2276 FB_AC66.tmp.exe Token: SeIncreaseQuotaPrivilege 2276 FB_AC66.tmp.exe Token: SeAssignPrimaryTokenPrivilege 2276 FB_AC66.tmp.exe Token: SeImpersonatePrivilege 2276 FB_AC66.tmp.exe Token: SeTcbPrivilege 2276 FB_AC66.tmp.exe Token: SeChangeNotifyPrivilege 2276 FB_AC66.tmp.exe Token: SeCreateTokenPrivilege 2276 FB_AC66.tmp.exe Token: SeBackupPrivilege 2276 FB_AC66.tmp.exe Token: SeRestorePrivilege 2276 FB_AC66.tmp.exe Token: SeIncreaseQuotaPrivilege 2276 FB_AC66.tmp.exe Token: SeAssignPrimaryTokenPrivilege 2276 FB_AC66.tmp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2732 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2732 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2732 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2612 wrote to memory of 1816 2612 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 30 PID 2612 wrote to memory of 1816 2612 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 30 PID 2612 wrote to memory of 1816 2612 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 30 PID 2612 wrote to memory of 1816 2612 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 30 PID 2612 wrote to memory of 1816 2612 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 30 PID 2612 wrote to memory of 1816 2612 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 30 PID 2612 wrote to memory of 1816 2612 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 30 PID 2612 wrote to memory of 1816 2612 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 30 PID 2612 wrote to memory of 1816 2612 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 30 PID 2612 wrote to memory of 1816 2612 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 30 PID 1816 wrote to memory of 2080 1816 iexplore.exe 31 PID 1816 wrote to memory of 2080 1816 iexplore.exe 31 PID 1816 wrote to memory of 2080 1816 iexplore.exe 31 PID 1816 wrote to memory of 2080 1816 iexplore.exe 31 PID 1816 wrote to memory of 2276 1816 iexplore.exe 32 PID 1816 wrote to memory of 2276 1816 iexplore.exe 32 PID 1816 wrote to memory of 2276 1816 iexplore.exe 32 PID 1816 wrote to memory of 2276 1816 iexplore.exe 32 PID 2080 wrote to memory of 2912 2080 FB_ABF8.tmp.exe 33 PID 2080 wrote to memory of 2912 2080 FB_ABF8.tmp.exe 33 PID 2080 wrote to memory of 2912 2080 FB_ABF8.tmp.exe 33 PID 2080 wrote to memory of 2912 2080 FB_ABF8.tmp.exe 33 PID 2912 wrote to memory of 1108 2912 imyxk.exe 19 PID 2912 wrote to memory of 1108 2912 imyxk.exe 19 PID 2912 wrote to memory of 1108 2912 imyxk.exe 19 PID 2912 wrote to memory of 1108 2912 imyxk.exe 19 PID 2912 wrote to memory of 1108 2912 imyxk.exe 19 PID 2912 wrote to memory of 1172 2912 imyxk.exe 20 PID 2912 wrote to memory of 1172 2912 imyxk.exe 20 PID 2912 wrote to memory of 1172 2912 imyxk.exe 20 PID 2912 wrote to memory of 1172 2912 imyxk.exe 20 PID 2912 wrote to memory of 1172 2912 imyxk.exe 20 PID 2912 wrote to memory of 1208 2912 imyxk.exe 21 PID 2912 wrote to memory of 1208 2912 imyxk.exe 21 PID 2912 wrote to memory of 1208 2912 imyxk.exe 21 PID 2912 wrote to memory of 1208 2912 imyxk.exe 21 PID 2912 wrote to memory of 1208 2912 imyxk.exe 21 PID 2912 wrote to memory of 852 2912 imyxk.exe 25 PID 2912 wrote to memory of 852 2912 imyxk.exe 25 PID 2912 wrote to memory of 852 2912 imyxk.exe 25 PID 2912 wrote to memory of 852 2912 imyxk.exe 25 PID 2912 wrote to memory of 852 2912 imyxk.exe 25 PID 2912 wrote to memory of 2080 2912 imyxk.exe 31 PID 2912 wrote to memory of 2080 2912 imyxk.exe 31 PID 2912 wrote to memory of 2080 2912 imyxk.exe 31 PID 2912 wrote to memory of 2080 2912 imyxk.exe 31 PID 2912 wrote to memory of 2080 2912 imyxk.exe 31 PID 2912 wrote to memory of 2276 2912 imyxk.exe 32 PID 2912 wrote to memory of 2276 2912 imyxk.exe 32 PID 2912 wrote to memory of 2276 2912 imyxk.exe 32 PID 2912 wrote to memory of 2276 2912 imyxk.exe 32 PID 2912 wrote to memory of 2276 2912 imyxk.exe 32 PID 2080 wrote to memory of 2724 2080 FB_ABF8.tmp.exe 35 PID 2080 wrote to memory of 2724 2080 FB_ABF8.tmp.exe 35 PID 2080 wrote to memory of 2724 2080 FB_ABF8.tmp.exe 35 PID 2080 wrote to memory of 2724 2080 FB_ABF8.tmp.exe 35 PID 2080 wrote to memory of 2724 2080 FB_ABF8.tmp.exe 35 PID 2080 wrote to memory of 2724 2080 FB_ABF8.tmp.exe 35 PID 2080 wrote to memory of 2724 2080 FB_ABF8.tmp.exe 35 PID 2080 wrote to memory of 2724 2080 FB_ABF8.tmp.exe 35 PID 2080 wrote to memory of 2724 2080 FB_ABF8.tmp.exe 35 PID 2912 wrote to memory of 2968 2912 imyxk.exe 37 PID 2912 wrote to memory of 2968 2912 imyxk.exe 37 PID 2912 wrote to memory of 2968 2912 imyxk.exe 37 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook FB_AC66.tmp.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe"C:\Users\Admin\AppData\Local\Temp\64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\FB_ABF8.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_ABF8.tmp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Roaming\Okefxi\imyxk.exe"C:\Users\Admin\AppData\Roaming\Okefxi\imyxk.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp136149ec.bat"5⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
-
C:\Users\Admin\AppData\Local\Temp\FB_AC66.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_AC66.tmp.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259451097.bat" "C:\Users\Admin\AppData\Local\Temp\FB_AC66.tmp.exe" "5⤵
- System Location Discovery: System Language Discovery
PID:1652
-
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:852
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2732
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2968
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1516
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:980
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2068
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD56a5f5ff481c0195282bc40dba3bd209b
SHA14838ff8193060557cc7fea2df6e5acdf9ccccf56
SHA2564c4011ef9e039a5de8ac1a5d6dc16c606cf6e913f4e73b0b047c35ec7b58a055
SHA51245710c483ea7e8b3048b213735ab67923fbe65a71ea2ab37504c78ec69d0d6527a5c42890d20db69e56b4f8ddaec19fb6b23667ad2f9fa4c179c5dbfdd8833f5
-
Filesize
94B
MD53880eeb1c736d853eb13b44898b718ab
SHA14eec9d50360cd815211e3c4e6bdd08271b6ec8e6
SHA256936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7
SHA5123eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b
-
Filesize
201B
MD5c44777ea1004caf4a88b9f0ccb21654e
SHA14e6dd433af0ac685d76d4968b4386bc0280804ae
SHA2563646a28c2980acb0d8b625d3d44a9891d32102ec8056ca021d94861a9075e3b4
SHA51223f87eb85124b340ee2fd2ddd1d78812cb8a5079045deb1ce28e838effe6922fe186e3b90a63168ffd3c821c664043a7554e2e91c231f7977f8e1b57929c875e
-
Filesize
345B
MD59cc593ec573b3a9f11a3e4105d968044
SHA15f02ab63bb853878e239c7efff6a9539ad1b0f17
SHA256aa10873aef55a8ec08ded0d4d93aeaf78ed7af89da68a4bdb17b2f5bd1dcef61
SHA512e42530e97cb203b1224d15cbe96282bb977f5e91ce1cd267ce071ff12ff8a8170bda4010ef4d7693a1271fec1b7127eff5f705dafd701d059a7cfbb1b221f333
-
Filesize
138KB
MD57f5da25c7eaa97d92532d22160abc7e2
SHA10630ecfacd812605dcc86fc38ad05c5aac089fb0
SHA256dc2510ab9a346ec323946b518264180be6be672c116e0911aede5e85ede7bfc8
SHA512e676f6434bc371a66ac4b908587290d1ccf6afe1eb7573e3c4e9ea6dbc6fb15ec37f3c5f90d14599db0d51f097e51c45c485cdc77ec3584e8f92eb96c04928d3
-
Filesize
34KB
MD58445ad8edaca0218f02c94fd227e3f83
SHA19902c7ff62c6e0d1bad3a8876e48c835f6cfb857
SHA256a3910669d44d2a6f9f38a4764bd8a86bfc52efec95ec1cbae0ca6d98e7fe10c2
SHA5129dfcb3acf39306102b4b2dba6d319807a10d99e5bbb3b3d2df553c3ddd28ca19f3a5b3a2a2a76c09a0b844315899e245562ec766569ac9e6330a3cabc2714ca2
-
Filesize
138KB
MD5b021004c8de29d23eaf5e273f4dd6ab4
SHA19ef05203c8656a845b948a8ed9fff8fce1ecc353
SHA256de07eb2e0908c7cd8345a8f822b6ae5121f345abe7a874946b071043ab978664
SHA51291cd39d889b919d80f81d77a588fa9310390afbf1a4dedc7e596b157541255928caa50771272007f0ad151fa447d626d0311639844fa4f2465fcf237624d5563