Overview
overview
10Static
static
1kmSdem1.exe
windows7-x64
7kmSdem1.exe
windows10-2004-x64
3readme[1].exe
windows7-x64
10readme[1].exe
windows10-2004-x64
10voyjy.exe
windows7-x64
1voyjy.exe
windows10-2004-x64
3w9ks9.exe
windows7-x64
7w9ks9.exe
windows10-2004-x64
3wpbt0.exe
windows7-x64
wpbt0.exe
windows10-2004-x64
10General
-
Target
8c8a043a50d754beb906215e3bba7dd3_JaffaCakes118
-
Size
894KB
-
Sample
241103-vhe6qazcrq
-
MD5
8c8a043a50d754beb906215e3bba7dd3
-
SHA1
00ba84424821a7d8a50aa4c9419ae14b48d2ba58
-
SHA256
cb5c12b4a3fa286e1995422a88edf24b36f297395cf564bb21dd595d477626ab
-
SHA512
01ca95f95c64ce1f79ebb85f4d14e687b4b93d92c17388c2107c0b051fa72c8c69f4ba18f61c7d48f2ba2fa1a4692f49d11bee1790f5a26cc06d6882f2080e19
-
SSDEEP
24576:IBVZkgnnxUVPfUmbbxFyTDWs9G51nV9G51n+mbbxFyTDWS:INk+iVPsuyTrkLk+uyTP
Static task
static1
Behavioral task
behavioral1
Sample
kmSdem1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
kmSdem1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
readme[1].exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
readme[1].exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
voyjy.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
voyjy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
w9ks9.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
w9ks9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
wpbt0.exe
Resource
win7-20240903-en
Malware Config
Extracted
pony
http://infovega.lt:8080/pony/gate.php
http://subdatapro.com:8008/pony/gate.php
-
payload_url
http://www.eb3btz.com/72fTmEXk/w9ks9.exe
http://ftp.imperiumit.com.br/gvoWhVVf/kmSdem1.exe
http://lavanderiatingemais.com.br/F6EyS5D7/A5m.exe
Targets
-
-
Target
kmSdem1.exe
-
Size
268KB
-
MD5
dae810ed8cf180a99a0c0572b4f8f9b5
-
SHA1
1923b46caac111b8fa04345cbfe9861e5fca7c32
-
SHA256
f781f7a6d12d8e7581fa4ccd6365f3026af61df4b4a1b2d27d56e8b6bf118aea
-
SHA512
5792e317bba8c5d4ca305fd427b03dd972e1e8057190695df6aac41b705ab7e3686fedb3da54fd806e1ebb04cc7a3eac1525a5f7a0c8e20279915a830505b7e8
-
SSDEEP
6144:SKDFWqyd3oxcdzOjcufgM7e3lSQtZ0PoOKEtq70uHRinFBqLTabu0W:lDwu+OjcufWlvQoOKEtY/xUBqLSxW
Score7/10-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
readme[1].exe
-
Size
93KB
-
MD5
2bbe5400ffddde10f37a972d2be79f27
-
SHA1
11580a46f86d0dffd43fa82b20c24c62100a0d9e
-
SHA256
a72f6c724a461af7d85df7e1403012cf6f0c539e1d335be77605b6725b47465a
-
SHA512
675e4bcf57006543111ef9d8914723671042556a59a1f5ff81deb65f7037c27e44dd436ec5fdf45d266c2b33a013c98089dfb9eb1d2b40f9a377be3c5c522dc9
-
SSDEEP
1536:dGbia9GTRKHeYjtOHkbvNcyMqh23Us9HMM7XPhOsyMZzXlLrixqMUtbB5Aan2c:dGOEGT0HeSkIcy9h2rLXPQTWBLrvB5Am
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
-
-
Target
voyjy.exe
-
Size
268KB
-
MD5
e0609d0655cb7d4e90a13dfda6b08937
-
SHA1
baeb5c24af288db9980f37726b52b2e91feaeabf
-
SHA256
892133290df85529ea22ad5cc27f251687e802f82ea87eb25cf5d58391cda016
-
SHA512
a9c5759611744e07b06d8dbe442d7b2c231566c509b09767d4f3a8da3e8380162cff8c3011c4dfd792c7adf627503869c6ea8b34dbbe51462a031f3edafcb876
-
SSDEEP
6144:qKD/vqyd3oxcdzWjcufgM7e3lSQtb0PoOKEtq70uHRinFBqLTabu0n:9DHu+WjcufWlvmoOKEtY/xUBqLSxn
Score3/10 -
-
-
Target
w9ks9.exe
-
Size
268KB
-
MD5
dae810ed8cf180a99a0c0572b4f8f9b5
-
SHA1
1923b46caac111b8fa04345cbfe9861e5fca7c32
-
SHA256
f781f7a6d12d8e7581fa4ccd6365f3026af61df4b4a1b2d27d56e8b6bf118aea
-
SHA512
5792e317bba8c5d4ca305fd427b03dd972e1e8057190695df6aac41b705ab7e3686fedb3da54fd806e1ebb04cc7a3eac1525a5f7a0c8e20279915a830505b7e8
-
SSDEEP
6144:SKDFWqyd3oxcdzOjcufgM7e3lSQtZ0PoOKEtq70uHRinFBqLTabu0W:lDwu+OjcufWlvQoOKEtY/xUBqLSxW
Score7/10-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
wpbt0.dll
-
Size
93KB
-
MD5
2bbe5400ffddde10f37a972d2be79f27
-
SHA1
11580a46f86d0dffd43fa82b20c24c62100a0d9e
-
SHA256
a72f6c724a461af7d85df7e1403012cf6f0c539e1d335be77605b6725b47465a
-
SHA512
675e4bcf57006543111ef9d8914723671042556a59a1f5ff81deb65f7037c27e44dd436ec5fdf45d266c2b33a013c98089dfb9eb1d2b40f9a377be3c5c522dc9
-
SSDEEP
1536:dGbia9GTRKHeYjtOHkbvNcyMqh23Us9HMM7XPhOsyMZzXlLrixqMUtbB5Aan2c:dGOEGT0HeSkIcy9h2rLXPQTWBLrvB5Am
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3