Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe
Resource
win10v2004-20240802-en
General
-
Target
64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe
-
Size
684KB
-
MD5
f30b5469b217401922b630a70c0d6b25
-
SHA1
8c3f8b0dd9f522265ddebe063a0f03d8ffbd5c06
-
SHA256
64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a
-
SHA512
608c86e693c6ec756f3224eba7667fb66b2f78f116c4574647d3a490ee1c95b4fa23e1bf7529a5a8471bc966c909bb43d943cc32da61ce875899300cccf703c5
-
SSDEEP
12288:+rem0ZUDEB8K1GFvzGJ5AB53hzwGCa4IE7CEB8K1GFvzGJ5AB53hzwGCa4IE7H:0+UYebzGLABTzwDx7RebzGLABTzwDx7H
Malware Config
Extracted
pony
http://godhelpusthisyear.biz/wordpress/wp-admin/blacker/php/gate.php
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation FB_9636.tmp.exe -
Executes dropped EXE 2 IoCs
pid Process 4996 FB_94DD.tmp.exe 1852 FB_9636.tmp.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0007000000023454-12.dat upx behavioral2/memory/1852-16-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1852-18-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1852-22-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts FB_9636.tmp.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook FB_9636.tmp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2316 set thread context of 3436 2316 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB_94DD.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB_9636.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeImpersonatePrivilege 1852 FB_9636.tmp.exe Token: SeTcbPrivilege 1852 FB_9636.tmp.exe Token: SeChangeNotifyPrivilege 1852 FB_9636.tmp.exe Token: SeCreateTokenPrivilege 1852 FB_9636.tmp.exe Token: SeBackupPrivilege 1852 FB_9636.tmp.exe Token: SeRestorePrivilege 1852 FB_9636.tmp.exe Token: SeIncreaseQuotaPrivilege 1852 FB_9636.tmp.exe Token: SeAssignPrimaryTokenPrivilege 1852 FB_9636.tmp.exe Token: SeImpersonatePrivilege 1852 FB_9636.tmp.exe Token: SeTcbPrivilege 1852 FB_9636.tmp.exe Token: SeChangeNotifyPrivilege 1852 FB_9636.tmp.exe Token: SeCreateTokenPrivilege 1852 FB_9636.tmp.exe Token: SeBackupPrivilege 1852 FB_9636.tmp.exe Token: SeRestorePrivilege 1852 FB_9636.tmp.exe Token: SeIncreaseQuotaPrivilege 1852 FB_9636.tmp.exe Token: SeAssignPrimaryTokenPrivilege 1852 FB_9636.tmp.exe Token: SeImpersonatePrivilege 1852 FB_9636.tmp.exe Token: SeTcbPrivilege 1852 FB_9636.tmp.exe Token: SeChangeNotifyPrivilege 1852 FB_9636.tmp.exe Token: SeCreateTokenPrivilege 1852 FB_9636.tmp.exe Token: SeBackupPrivilege 1852 FB_9636.tmp.exe Token: SeRestorePrivilege 1852 FB_9636.tmp.exe Token: SeIncreaseQuotaPrivilege 1852 FB_9636.tmp.exe Token: SeAssignPrimaryTokenPrivilege 1852 FB_9636.tmp.exe Token: SeImpersonatePrivilege 1852 FB_9636.tmp.exe Token: SeTcbPrivilege 1852 FB_9636.tmp.exe Token: SeChangeNotifyPrivilege 1852 FB_9636.tmp.exe Token: SeCreateTokenPrivilege 1852 FB_9636.tmp.exe Token: SeBackupPrivilege 1852 FB_9636.tmp.exe Token: SeRestorePrivilege 1852 FB_9636.tmp.exe Token: SeIncreaseQuotaPrivilege 1852 FB_9636.tmp.exe Token: SeAssignPrimaryTokenPrivilege 1852 FB_9636.tmp.exe Token: SeImpersonatePrivilege 1852 FB_9636.tmp.exe Token: SeTcbPrivilege 1852 FB_9636.tmp.exe Token: SeChangeNotifyPrivilege 1852 FB_9636.tmp.exe Token: SeCreateTokenPrivilege 1852 FB_9636.tmp.exe Token: SeBackupPrivilege 1852 FB_9636.tmp.exe Token: SeRestorePrivilege 1852 FB_9636.tmp.exe Token: SeIncreaseQuotaPrivilege 1852 FB_9636.tmp.exe Token: SeAssignPrimaryTokenPrivilege 1852 FB_9636.tmp.exe Token: SeImpersonatePrivilege 1852 FB_9636.tmp.exe Token: SeTcbPrivilege 1852 FB_9636.tmp.exe Token: SeChangeNotifyPrivilege 1852 FB_9636.tmp.exe Token: SeCreateTokenPrivilege 1852 FB_9636.tmp.exe Token: SeBackupPrivilege 1852 FB_9636.tmp.exe Token: SeRestorePrivilege 1852 FB_9636.tmp.exe Token: SeIncreaseQuotaPrivilege 1852 FB_9636.tmp.exe Token: SeAssignPrimaryTokenPrivilege 1852 FB_9636.tmp.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2316 wrote to memory of 3436 2316 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 86 PID 2316 wrote to memory of 3436 2316 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 86 PID 2316 wrote to memory of 3436 2316 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 86 PID 2316 wrote to memory of 3436 2316 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 86 PID 2316 wrote to memory of 3436 2316 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 86 PID 2316 wrote to memory of 3436 2316 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 86 PID 2316 wrote to memory of 3436 2316 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 86 PID 2316 wrote to memory of 3436 2316 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 86 PID 2316 wrote to memory of 3436 2316 64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe 86 PID 3436 wrote to memory of 4996 3436 iexplore.exe 87 PID 3436 wrote to memory of 4996 3436 iexplore.exe 87 PID 3436 wrote to memory of 4996 3436 iexplore.exe 87 PID 3436 wrote to memory of 1852 3436 iexplore.exe 88 PID 3436 wrote to memory of 1852 3436 iexplore.exe 88 PID 3436 wrote to memory of 1852 3436 iexplore.exe 88 PID 1852 wrote to memory of 2008 1852 FB_9636.tmp.exe 92 PID 1852 wrote to memory of 2008 1852 FB_9636.tmp.exe 92 PID 1852 wrote to memory of 2008 1852 FB_9636.tmp.exe 92 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook FB_9636.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe"C:\Users\Admin\AppData\Local\Temp\64caa8b2692a21bb3a737ac89ff4eab15588e29836a7fd04cf503f01c72d139a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\FB_94DD.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_94DD.tmp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4996
-
-
C:\Users\Admin\AppData\Local\Temp\FB_9636.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_9636.tmp.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:1852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240632015.bat" "C:\Users\Admin\AppData\Local\Temp\FB_9636.tmp.exe" "4⤵
- System Location Discovery: System Language Discovery
PID:2008
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94B
MD53880eeb1c736d853eb13b44898b718ab
SHA14eec9d50360cd815211e3c4e6bdd08271b6ec8e6
SHA256936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7
SHA5123eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b
-
Filesize
138KB
MD57f5da25c7eaa97d92532d22160abc7e2
SHA10630ecfacd812605dcc86fc38ad05c5aac089fb0
SHA256dc2510ab9a346ec323946b518264180be6be672c116e0911aede5e85ede7bfc8
SHA512e676f6434bc371a66ac4b908587290d1ccf6afe1eb7573e3c4e9ea6dbc6fb15ec37f3c5f90d14599db0d51f097e51c45c485cdc77ec3584e8f92eb96c04928d3
-
Filesize
34KB
MD58445ad8edaca0218f02c94fd227e3f83
SHA19902c7ff62c6e0d1bad3a8876e48c835f6cfb857
SHA256a3910669d44d2a6f9f38a4764bd8a86bfc52efec95ec1cbae0ca6d98e7fe10c2
SHA5129dfcb3acf39306102b4b2dba6d319807a10d99e5bbb3b3d2df553c3ddd28ca19f3a5b3a2a2a76c09a0b844315899e245562ec766569ac9e6330a3cabc2714ca2