Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
2FBFC79462B64751C339F0B0297C748F.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2FBFC79462B64751C339F0B0297C748F.exe
Resource
win10v2004-20241007-en
General
-
Target
2FBFC79462B64751C339F0B0297C748F.exe
-
Size
372KB
-
MD5
2fbfc79462b64751c339f0b0297c748f
-
SHA1
3c07b52af2661e02e4db7dc978a83db0ba7c570f
-
SHA256
2b7658a9c50bf8ee549193723e56b6500d4a193a5eb8e10871c67956d5d4e835
-
SHA512
dbc3b7d8a7419feacf98481f542991edfcfe67d48a31244aff3818d28770842c2b7fd62a6d174e0132946ab73e60c00213a3c116090559e75512f38047b7a827
-
SSDEEP
3072:eps58pvoY9pm4arHiETYPTP3vfdHldhwE3vfdHldhwVOpvoY9FpvoY9jmJm4arq3:UW8Zr9U4nE49Zr9FZr9q04BnEASEg
Malware Config
Extracted
pony
http://6.magicalomaha.co/forum/viewtopic.php
http://6.magicalomaha.com/forum/viewtopic.php
-
payload_url
http://dynamotouren.de/4XM2f.exe
http://app.bi.com.tr/fPFa.exe
http://72.32.185.12/rd7nr.exe
http://208.116.13.164/b6dK7rwV.exe
http://www.seigner-art.at/fPsx8i.exe
http://www.aboessen24.de/WWkULwkq.exe
Signatures
-
Pony family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 2FBFC79462B64751C339F0B0297C748F.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 2FBFC79462B64751C339F0B0297C748F.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2FBFC79462B64751C339F0B0297C748F.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 1092 2FBFC79462B64751C339F0B0297C748F.exe Token: SeTcbPrivilege 1092 2FBFC79462B64751C339F0B0297C748F.exe Token: SeChangeNotifyPrivilege 1092 2FBFC79462B64751C339F0B0297C748F.exe Token: SeCreateTokenPrivilege 1092 2FBFC79462B64751C339F0B0297C748F.exe Token: SeBackupPrivilege 1092 2FBFC79462B64751C339F0B0297C748F.exe Token: SeRestorePrivilege 1092 2FBFC79462B64751C339F0B0297C748F.exe Token: SeIncreaseQuotaPrivilege 1092 2FBFC79462B64751C339F0B0297C748F.exe Token: SeAssignPrimaryTokenPrivilege 1092 2FBFC79462B64751C339F0B0297C748F.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 2FBFC79462B64751C339F0B0297C748F.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2FBFC79462B64751C339F0B0297C748F.exe"C:\Users\Admin\AppData\Local\Temp\2FBFC79462B64751C339F0B0297C748F.exe"1⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
PID:1092