Analysis
-
max time kernel
95s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 14:55
Static task
static1
Behavioral task
behavioral1
Sample
TT COPY.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
TT COPY.exe
Resource
win10v2004-20241007-en
General
-
Target
TT COPY.exe
-
Size
187KB
-
MD5
adf3ea832fd13ccc120db525c06eb9f0
-
SHA1
7d1463aa78686b09cdd1563ccbf98704e374252f
-
SHA256
d3928cc800a33ad165e90f2e52c2a0181839a0c66a268afddd8a687abcdb6f08
-
SHA512
15fc244395233b9c31f085d0c3c6314e04faba46dff5a089a24bdc6452ee8c93967fd95414f536ea9e3a6254d298df1f2b084ff43d5dab3bc82dcdda6d8d7008
-
SSDEEP
3072:Dnj9jtfU+INndIc0J65isx5jsyWWAgiGaE7hRT+6ld9z5fwg+BzqJxH0pfjevpZA:Djbeis/4yWEiGXhRa4d9zdwNmuYTyNPv
Malware Config
Extracted
pony
http://excelereteenergy.com/mala01/mala001/gate.php
Signatures
-
Pony family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 1.scr -
Executes dropped EXE 4 IoCs
pid Process 4972 1.scr 2248 1.scr 2776 1.scr 3600 1.scr -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 1.scr -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 1.scr -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" TT COPY.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4972 set thread context of 2776 4972 1.scr 88 -
resource yara_rule behavioral2/memory/2776-26-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2776-24-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2776-19-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2776-28-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2776-27-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TT COPY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4972 1.scr 4972 1.scr 4972 1.scr 4972 1.scr -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 4972 1.scr Token: SeImpersonatePrivilege 2776 1.scr Token: SeTcbPrivilege 2776 1.scr Token: SeChangeNotifyPrivilege 2776 1.scr Token: SeCreateTokenPrivilege 2776 1.scr Token: SeBackupPrivilege 2776 1.scr Token: SeRestorePrivilege 2776 1.scr Token: SeIncreaseQuotaPrivilege 2776 1.scr Token: SeAssignPrimaryTokenPrivilege 2776 1.scr Token: SeImpersonatePrivilege 2776 1.scr Token: SeTcbPrivilege 2776 1.scr Token: SeChangeNotifyPrivilege 2776 1.scr Token: SeCreateTokenPrivilege 2776 1.scr Token: SeBackupPrivilege 2776 1.scr Token: SeRestorePrivilege 2776 1.scr Token: SeIncreaseQuotaPrivilege 2776 1.scr Token: SeAssignPrimaryTokenPrivilege 2776 1.scr Token: SeImpersonatePrivilege 2776 1.scr Token: SeTcbPrivilege 2776 1.scr Token: SeChangeNotifyPrivilege 2776 1.scr Token: SeCreateTokenPrivilege 2776 1.scr Token: SeBackupPrivilege 2776 1.scr Token: SeRestorePrivilege 2776 1.scr Token: SeIncreaseQuotaPrivilege 2776 1.scr Token: SeAssignPrimaryTokenPrivilege 2776 1.scr Token: SeImpersonatePrivilege 2776 1.scr Token: SeTcbPrivilege 2776 1.scr Token: SeChangeNotifyPrivilege 2776 1.scr Token: SeCreateTokenPrivilege 2776 1.scr Token: SeBackupPrivilege 2776 1.scr Token: SeRestorePrivilege 2776 1.scr Token: SeIncreaseQuotaPrivilege 2776 1.scr Token: SeAssignPrimaryTokenPrivilege 2776 1.scr Token: SeImpersonatePrivilege 2776 1.scr Token: SeTcbPrivilege 2776 1.scr Token: SeChangeNotifyPrivilege 2776 1.scr Token: SeCreateTokenPrivilege 2776 1.scr Token: SeBackupPrivilege 2776 1.scr Token: SeRestorePrivilege 2776 1.scr Token: SeIncreaseQuotaPrivilege 2776 1.scr Token: SeAssignPrimaryTokenPrivilege 2776 1.scr Token: SeImpersonatePrivilege 2776 1.scr Token: SeTcbPrivilege 2776 1.scr Token: SeChangeNotifyPrivilege 2776 1.scr Token: SeCreateTokenPrivilege 2776 1.scr Token: SeBackupPrivilege 2776 1.scr Token: SeRestorePrivilege 2776 1.scr Token: SeIncreaseQuotaPrivilege 2776 1.scr Token: SeAssignPrimaryTokenPrivilege 2776 1.scr -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 988 wrote to memory of 4972 988 TT COPY.exe 83 PID 988 wrote to memory of 4972 988 TT COPY.exe 83 PID 988 wrote to memory of 4972 988 TT COPY.exe 83 PID 4972 wrote to memory of 1528 4972 1.scr 84 PID 4972 wrote to memory of 1528 4972 1.scr 84 PID 4972 wrote to memory of 1528 4972 1.scr 84 PID 4972 wrote to memory of 3600 4972 1.scr 85 PID 4972 wrote to memory of 3600 4972 1.scr 85 PID 4972 wrote to memory of 3600 4972 1.scr 85 PID 4972 wrote to memory of 2248 4972 1.scr 86 PID 4972 wrote to memory of 2248 4972 1.scr 86 PID 4972 wrote to memory of 2248 4972 1.scr 86 PID 4972 wrote to memory of 2776 4972 1.scr 88 PID 4972 wrote to memory of 2776 4972 1.scr 88 PID 4972 wrote to memory of 2776 4972 1.scr 88 PID 4972 wrote to memory of 2776 4972 1.scr 88 PID 4972 wrote to memory of 2776 4972 1.scr 88 PID 4972 wrote to memory of 2776 4972 1.scr 88 PID 4972 wrote to memory of 2776 4972 1.scr 88 PID 4972 wrote to memory of 2776 4972 1.scr 88 PID 4972 wrote to memory of 2776 4972 1.scr 88 PID 1528 wrote to memory of 4184 1528 cmd.exe 89 PID 1528 wrote to memory of 4184 1528 cmd.exe 89 PID 1528 wrote to memory of 4184 1528 cmd.exe 89 PID 4184 wrote to memory of 2688 4184 net.exe 90 PID 4184 wrote to memory of 2688 4184 net.exe 90 PID 4184 wrote to memory of 2688 4184 net.exe 90 PID 2776 wrote to memory of 3500 2776 1.scr 91 PID 2776 wrote to memory of 3500 2776 1.scr 91 PID 2776 wrote to memory of 3500 2776 1.scr 91 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 1.scr
Processes
-
C:\Users\Admin\AppData\Local\Temp\TT COPY.exe"C:\Users\Admin\AppData\Local\Temp\TT COPY.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.scrC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.scr2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc5⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.scrC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.scr3⤵
- Executes dropped EXE
PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.scrC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.scr3⤵
- Executes dropped EXE
PID:2248
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.scrC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.scr3⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_win_path
PID:2776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240631687.bat" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.scr" "4⤵
- System Location Discovery: System Language Discovery
PID:3500
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD5527baa5540c9346b5da8afccc0ea9310
SHA15c376955164ca615872342bef854a5f2ea229844
SHA256720a17112f2e94796e86d644439b9195d98846f528b06a01b054a08f2dd71f10
SHA51255ff231fc4721be8c2c9ac9638c071badee5418172ba631cd7366779c50b340a7e94a054364ec0d7f7ace85bd2e591ffdb114f81922232f8f8ac78d893cae5c3
-
Filesize
94B
MD53880eeb1c736d853eb13b44898b718ab
SHA14eec9d50360cd815211e3c4e6bdd08271b6ec8e6
SHA256936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7
SHA5123eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b
-
Filesize
48KB
MD5079a2efceb0ddc7234c721df01118a95
SHA1c936df9117a4fb2c0e8e14e674cf2e729bfc52f4
SHA2567433f54f8af3eecc57852c82d34718c927c0261c19be8a20fa3e86c7ff625704
SHA512471f33926552740001d0e1c5a1c5a1edea4cbdf310afa31248cae24c4be5f2d9ef34d45ce6e7a6fe8bde05cf362f345c08b4dac021e2378cbfa3422b297be140