Analysis
-
max time kernel
48s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 14:55
Static task
static1
Behavioral task
behavioral1
Sample
178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe
Resource
win10v2004-20241007-en
General
-
Target
178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe
-
Size
102KB
-
MD5
bad5f1985ab1659c03cd973b8e20dce6
-
SHA1
994e0658a3fe355d0d8737e71472435693978286
-
SHA256
178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793
-
SHA512
f76d6e66feacdf31b537aa7e9e8a857d35280a1bde6b0f28663ae0df8b90d49f66bb27edc5767ef791b9eb5f215207b5f818e939ad1588865f195b84ec7de325
-
SSDEEP
1536:zLKgcGTGv3jidXitUkFQIILQODrAppGXQN60GtOA4VxGfoypvcF+fOvka/a:XK+lSHFQIIcsA3MOA2GlvN5a/a
Malware Config
Extracted
pony
http://xhfdrtu.pw:4915/doc/black.php
http://xhfdrtu.pw:888/doc/black.php
-
payload_url
http://mimedyf.pw:888/pic/Flash.exe
Signatures
-
Pony family
-
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\tmp.tmp 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe File created C:\Windows\system32\drivers\etc\hosts.sam cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hosts.sam cmd.exe -
Deletes itself 1 IoCs
pid Process 2760 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hide Artifacts: Hidden Files and Directories 1 TTPs 2 IoCs
pid Process 2716 cmd.exe 2768 at.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2760 cmd.exe 2712 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2712 PING.EXE -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeImpersonatePrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeTcbPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeChangeNotifyPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeCreateTokenPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeBackupPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeRestorePrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeIncreaseQuotaPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeAssignPrimaryTokenPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeImpersonatePrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeTcbPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeChangeNotifyPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeCreateTokenPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeBackupPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeRestorePrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeIncreaseQuotaPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeAssignPrimaryTokenPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeImpersonatePrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeTcbPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeChangeNotifyPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeCreateTokenPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeBackupPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeRestorePrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeIncreaseQuotaPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeAssignPrimaryTokenPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeImpersonatePrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeTcbPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeChangeNotifyPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeCreateTokenPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeBackupPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeRestorePrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeIncreaseQuotaPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe Token: SeAssignPrimaryTokenPrivilege 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1352 wrote to memory of 2716 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe 31 PID 1352 wrote to memory of 2716 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe 31 PID 1352 wrote to memory of 2716 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe 31 PID 1352 wrote to memory of 2716 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe 31 PID 1352 wrote to memory of 2760 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe 32 PID 1352 wrote to memory of 2760 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe 32 PID 1352 wrote to memory of 2760 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe 32 PID 1352 wrote to memory of 2760 1352 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe 32 PID 2716 wrote to memory of 2768 2716 cmd.exe 35 PID 2716 wrote to memory of 2768 2716 cmd.exe 35 PID 2716 wrote to memory of 2768 2716 cmd.exe 35 PID 2716 wrote to memory of 2768 2716 cmd.exe 35 PID 2760 wrote to memory of 2712 2760 cmd.exe 36 PID 2760 wrote to memory of 2712 2760 cmd.exe 36 PID 2760 wrote to memory of 2712 2760 cmd.exe 36 PID 2760 wrote to memory of 2712 2760 cmd.exe 36 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe"C:\Users\Admin\AppData\Local\Temp\178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe"1⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:1352 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy C:\Windows\system32\drivers\etc\hosts C:\Windows\system32\drivers\etc\hosts.sam /Y && at 14:59:00 /every:M,T,W,Th,F,S,Su cmd.exe "/c attrib -H C:\Windows\system32\drivers\etc\hosts && copy C:\Users\Admin\AppData\Local\Temp\259466993aq C:\Windows\system32\drivers\etc\hosts /Y && attrib +H C:\Windows\system32\drivers\etc\hosts"2⤵
- Drops file in Drivers directory
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\at.exeat 14:59:00 /every:M,T,W,Th,F,S,Su cmd.exe "/c attrib -H C:\Windows\system32\drivers\etc\hosts && copy C:\Users\Admin\AppData\Local\Temp\259466993aq C:\Windows\system32\drivers\etc\hosts /Y && attrib +H C:\Windows\system32\drivers\etc\hosts"3⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -n 6 localhost && erase "C:\Users\Admin\AppData\Local\Temp\178a95fbf68493fb68d9ad1e991bbb1f424b605b6d6936667ae043b2f00e5793.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\PING.EXEping -n 6 localhost3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3