Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27/01/2025, 06:40
Static task
static1
Behavioral task
behavioral1
Sample
Ecard.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Ecard.exe
Resource
win10v2004-20241007-en
General
-
Target
Ecard.exe
-
Size
241KB
-
MD5
7e8ea0313d709af979371f4181e183c7
-
SHA1
c34fa5d05d805dbb0db6625ab2a9ad0c5e3a3fea
-
SHA256
dcfa763016f07b439755539138f7bdc187d21272ba2ce7d7f18f34f23e10a8f5
-
SHA512
92cb728473f30f3083a68ec8a0c49763481a045f8af3ba6977b172c40497b3811a4390aa0d0a230a7c4ab2cb00229f201606937f7f4846b42df686fc0d64119c
-
SSDEEP
3072:SoRSFAdV76EVe5qK79HFg1C8KLluOwoLlE2te2giJ3UKxEo/StYNr8JUXZsxMxM:60LVe5fYVKweBtQKuoUUrxMrYo
Malware Config
Extracted
pony
http://mx9.inboxgateway.com/Uploads/353/Panel/gate.php
Signatures
-
Pony family
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2888 set thread context of 2896 2888 Ecard.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ecard.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeImpersonatePrivilege 2896 vbc.exe Token: SeTcbPrivilege 2896 vbc.exe Token: SeChangeNotifyPrivilege 2896 vbc.exe Token: SeCreateTokenPrivilege 2896 vbc.exe Token: SeBackupPrivilege 2896 vbc.exe Token: SeRestorePrivilege 2896 vbc.exe Token: SeIncreaseQuotaPrivilege 2896 vbc.exe Token: SeAssignPrimaryTokenPrivilege 2896 vbc.exe Token: SeImpersonatePrivilege 2896 vbc.exe Token: SeTcbPrivilege 2896 vbc.exe Token: SeChangeNotifyPrivilege 2896 vbc.exe Token: SeCreateTokenPrivilege 2896 vbc.exe Token: SeBackupPrivilege 2896 vbc.exe Token: SeRestorePrivilege 2896 vbc.exe Token: SeIncreaseQuotaPrivilege 2896 vbc.exe Token: SeAssignPrimaryTokenPrivilege 2896 vbc.exe Token: SeImpersonatePrivilege 2896 vbc.exe Token: SeTcbPrivilege 2896 vbc.exe Token: SeChangeNotifyPrivilege 2896 vbc.exe Token: SeCreateTokenPrivilege 2896 vbc.exe Token: SeBackupPrivilege 2896 vbc.exe Token: SeRestorePrivilege 2896 vbc.exe Token: SeIncreaseQuotaPrivilege 2896 vbc.exe Token: SeAssignPrimaryTokenPrivilege 2896 vbc.exe Token: SeImpersonatePrivilege 2896 vbc.exe Token: SeTcbPrivilege 2896 vbc.exe Token: SeChangeNotifyPrivilege 2896 vbc.exe Token: SeCreateTokenPrivilege 2896 vbc.exe Token: SeBackupPrivilege 2896 vbc.exe Token: SeRestorePrivilege 2896 vbc.exe Token: SeIncreaseQuotaPrivilege 2896 vbc.exe Token: SeAssignPrimaryTokenPrivilege 2896 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2888 Ecard.exe 2888 Ecard.exe 2692 DllHost.exe 2692 DllHost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2896 2888 Ecard.exe 30 PID 2888 wrote to memory of 2896 2888 Ecard.exe 30 PID 2888 wrote to memory of 2896 2888 Ecard.exe 30 PID 2888 wrote to memory of 2896 2888 Ecard.exe 30 PID 2888 wrote to memory of 2896 2888 Ecard.exe 30 PID 2888 wrote to memory of 2896 2888 Ecard.exe 30 PID 2888 wrote to memory of 2896 2888 Ecard.exe 30 PID 2888 wrote to memory of 2896 2888 Ecard.exe 30 PID 2888 wrote to memory of 2896 2888 Ecard.exe 30 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ecard.exe"C:\Users\Admin\AppData\Local\Temp\Ecard.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
PID:2896
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5cfa9d4ab2a393bd7cb420793b772ec28
SHA1470aead84e74cbcd197df7d1ddd1b8b6f42e5768
SHA256d6475b5e4cc893f838d25a419572fd0506b54f98acb9de65b890bb7efd8785a4
SHA512fe4d7b58e636a59d96b318e942b79bdd6fd679c03a5a44de8749a0594f7f7b96784745c886ae61d3bc86118e54c1a3fcaa6c3610f4de9574a03ff42d39137a21