Analysis
-
max time kernel
110s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
19d3e9be0486047462a512ad2ff59673e4ced2369bb9b421378c4882929078a4.exe
Resource
win7-20240903-en
General
-
Target
19d3e9be0486047462a512ad2ff59673e4ced2369bb9b421378c4882929078a4.exe
-
Size
250KB
-
MD5
2051c9d1079205ae93ce2353c7039d20
-
SHA1
7617d7baf1b7872ffaf900e8d6584f5d6c6aa890
-
SHA256
19d3e9be0486047462a512ad2ff59673e4ced2369bb9b421378c4882929078a4
-
SHA512
a6f02b9b2c09dc620ba4c34f7a55ed20309ff4081912627f009a47846c2d6f08388c17810a2560f7e6e2693a47f7060d48d40b359720276ddaab1e6c86511e3a
-
SSDEEP
3072:+ubec3ltiWjDhIxZCKJhk44ys+9Z5PuBT83thaL/cUYZ:l3ivRaU79POT6sT5c
Malware Config
Extracted
pony
http://176.28.18.135:8080/pony/gate.php
http://85.214.243.87:8080/pony/gate.php
http://88.85.99.44:8080/pony/gate.php
-
payload_url
http://cinecolor.com.ar/GPFito.exe
http://www.bomcreto.com.br/sWt7gc5m.exe
http://www.cyrpainting.cl/p6h.exe
http://hellenic-antiaging-academy.gr/2wY.exe
Signatures
-
Pony family
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19d3e9be0486047462a512ad2ff59673e4ced2369bb9b421378c4882929078a4.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeImpersonatePrivilege 4960 19d3e9be0486047462a512ad2ff59673e4ced2369bb9b421378c4882929078a4.exe Token: SeTcbPrivilege 4960 19d3e9be0486047462a512ad2ff59673e4ced2369bb9b421378c4882929078a4.exe Token: SeChangeNotifyPrivilege 4960 19d3e9be0486047462a512ad2ff59673e4ced2369bb9b421378c4882929078a4.exe Token: SeCreateTokenPrivilege 4960 19d3e9be0486047462a512ad2ff59673e4ced2369bb9b421378c4882929078a4.exe Token: SeBackupPrivilege 4960 19d3e9be0486047462a512ad2ff59673e4ced2369bb9b421378c4882929078a4.exe Token: SeRestorePrivilege 4960 19d3e9be0486047462a512ad2ff59673e4ced2369bb9b421378c4882929078a4.exe Token: SeIncreaseQuotaPrivilege 4960 19d3e9be0486047462a512ad2ff59673e4ced2369bb9b421378c4882929078a4.exe Token: SeAssignPrimaryTokenPrivilege 4960 19d3e9be0486047462a512ad2ff59673e4ced2369bb9b421378c4882929078a4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19d3e9be0486047462a512ad2ff59673e4ced2369bb9b421378c4882929078a4.exe"C:\Users\Admin\AppData\Local\Temp\19d3e9be0486047462a512ad2ff59673e4ced2369bb9b421378c4882929078a4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4960