Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16/01/2025, 21:25 UTC

General

  • Target

    24e62f812d15415d1f950f704da6e15da678b3a2e1315be2aa0d262f1e5425c5.exe

  • Size

    92KB

  • MD5

    5a058837d9999de9f669dcda66ed1d31

  • SHA1

    df675fda6651012df81f9959d040ddfaff160dcb

  • SHA256

    24e62f812d15415d1f950f704da6e15da678b3a2e1315be2aa0d262f1e5425c5

  • SHA512

    c643c85b03884639fa06e00a77b247adaa4f29601ad3bd7152c25780d45ff03016352d24bc1fb5afda14466629fff57eeffaa8eb5f022941642ca5abfab7a44e

  • SSDEEP

    1536:umAzsn5qsEgGnktdBpEgxQ7GIoTpg6SBNMlX22snxnBq1MfQVxcGifoMG1lh7G:uTsn5qsELktiGQ722lNfLJ6IyNr9

Malware Config

Signatures

  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Deletes itself 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24e62f812d15415d1f950f704da6e15da678b3a2e1315be2aa0d262f1e5425c5.exe
    "C:\Users\Admin\AppData\Local\Temp\24e62f812d15415d1f950f704da6e15da678b3a2e1315be2aa0d262f1e5425c5.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:264
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\ytk.bat" "C:\Users\Admin\AppData\Local\Temp\24e62f812d15415d1f950f704da6e15da678b3a2e1315be2aa0d262f1e5425c5.exe" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2624

Network

  • flag-us
    DNS
    layout.cnt.br
    24e62f812d15415d1f950f704da6e15da678b3a2e1315be2aa0d262f1e5425c5.exe
    Remote address:
    8.8.8.8:53
    Request
    layout.cnt.br
    IN A
    Response
  • flag-us
    DNS
    beyondcreativehm.com
    24e62f812d15415d1f950f704da6e15da678b3a2e1315be2aa0d262f1e5425c5.exe
    Remote address:
    8.8.8.8:53
    Request
    beyondcreativehm.com
    IN A
    Response
  • flag-us
    DNS
    fair-trans.at
    24e62f812d15415d1f950f704da6e15da678b3a2e1315be2aa0d262f1e5425c5.exe
    Remote address:
    8.8.8.8:53
    Request
    fair-trans.at
    IN A
    Response
    fair-trans.at
    IN A
    85.124.51.140
  • flag-at
    GET
    http://fair-trans.at/GTsvZ4j3/WtS.exe
    24e62f812d15415d1f950f704da6e15da678b3a2e1315be2aa0d262f1e5425c5.exe
    Remote address:
    85.124.51.140:80
    Request
    GET /GTsvZ4j3/WtS.exe HTTP/1.0
    Host: fair-trans.at
    Accept: */*
    Connection: close
    User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
    Response
    HTTP/1.1 404 Not Found
    Date: Thu, 16 Jan 2025 21:27:02 GMT
    Server: Apache
    Upgrade: h2,h2c
    Connection: Upgrade, close
    Last-Modified: Wed, 17 Nov 2021 07:11:12 GMT
    Accept-Ranges: bytes
    Content-Length: 12650
    Vary: Accept-Encoding,User-Agent
    Strict-Transport-Security: max-age=15768000
    Content-Type: text/html
  • 178.77.99.145:8080
    24e62f812d15415d1f950f704da6e15da678b3a2e1315be2aa0d262f1e5425c5.exe
    152 B
    3
  • 203.113.133.2:8080
    24e62f812d15415d1f950f704da6e15da678b3a2e1315be2aa0d262f1e5425c5.exe
    152 B
    3
  • 91.121.20.136:8080
    24e62f812d15415d1f950f704da6e15da678b3a2e1315be2aa0d262f1e5425c5.exe
    152 B
    3
  • 85.124.51.140:80
    http://fair-trans.at/GTsvZ4j3/WtS.exe
    http
    24e62f812d15415d1f950f704da6e15da678b3a2e1315be2aa0d262f1e5425c5.exe
    653 B
    13.5kB
    11
    14

    HTTP Request

    GET http://fair-trans.at/GTsvZ4j3/WtS.exe

    HTTP Response

    404
  • 8.8.8.8:53
    layout.cnt.br
    dns
    24e62f812d15415d1f950f704da6e15da678b3a2e1315be2aa0d262f1e5425c5.exe
    59 B
    121 B
    1
    1

    DNS Request

    layout.cnt.br

  • 8.8.8.8:53
    beyondcreativehm.com
    dns
    24e62f812d15415d1f950f704da6e15da678b3a2e1315be2aa0d262f1e5425c5.exe
    66 B
    139 B
    1
    1

    DNS Request

    beyondcreativehm.com

  • 8.8.8.8:53
    fair-trans.at
    dns
    24e62f812d15415d1f950f704da6e15da678b3a2e1315be2aa0d262f1e5425c5.exe
    59 B
    75 B
    1
    1

    DNS Request

    fair-trans.at

    DNS Response

    85.124.51.140

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ytk.bat

    Filesize

    71B

    MD5

    e6b031b9b7d40fa332ebc6f38b2f9f64

    SHA1

    d6dbffcfcc6a26188fd8d2e5b6257af4821fb48f

    SHA256

    66a04ff993916bce61351e4c3b94ea079c806efb1723c7cd79bd32aaf6847e0b

    SHA512

    7d17655334fcda4c3326110d340fd91cd23ee284dec99c3a8bbc8408342fda5f51e27aaba75fba4cccd513c342c22f07ad2cf6e2326ba575e3cc0eba4ea91948

  • memory/264-0-0x0000000000490000-0x0000000000590000-memory.dmp

    Filesize

    1024KB

  • memory/264-1-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/264-2-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/264-3-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.