Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 06:40
Static task
static1
Behavioral task
behavioral1
Sample
Ecard.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Ecard.exe
Resource
win10v2004-20241007-en
General
-
Target
Ecard.exe
-
Size
241KB
-
MD5
7e8ea0313d709af979371f4181e183c7
-
SHA1
c34fa5d05d805dbb0db6625ab2a9ad0c5e3a3fea
-
SHA256
dcfa763016f07b439755539138f7bdc187d21272ba2ce7d7f18f34f23e10a8f5
-
SHA512
92cb728473f30f3083a68ec8a0c49763481a045f8af3ba6977b172c40497b3811a4390aa0d0a230a7c4ab2cb00229f201606937f7f4846b42df686fc0d64119c
-
SSDEEP
3072:SoRSFAdV76EVe5qK79HFg1C8KLluOwoLlE2te2giJ3UKxEo/StYNr8JUXZsxMxM:60LVe5fYVKweBtQKuoUUrxMrYo
Malware Config
Extracted
pony
http://mx9.inboxgateway.com/Uploads/353/Panel/gate.php
Signatures
-
Pony family
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2252 set thread context of 4424 2252 Ecard.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ecard.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeImpersonatePrivilege 4424 vbc.exe Token: SeTcbPrivilege 4424 vbc.exe Token: SeChangeNotifyPrivilege 4424 vbc.exe Token: SeCreateTokenPrivilege 4424 vbc.exe Token: SeBackupPrivilege 4424 vbc.exe Token: SeRestorePrivilege 4424 vbc.exe Token: SeIncreaseQuotaPrivilege 4424 vbc.exe Token: SeAssignPrimaryTokenPrivilege 4424 vbc.exe Token: SeImpersonatePrivilege 4424 vbc.exe Token: SeTcbPrivilege 4424 vbc.exe Token: SeChangeNotifyPrivilege 4424 vbc.exe Token: SeCreateTokenPrivilege 4424 vbc.exe Token: SeBackupPrivilege 4424 vbc.exe Token: SeRestorePrivilege 4424 vbc.exe Token: SeIncreaseQuotaPrivilege 4424 vbc.exe Token: SeAssignPrimaryTokenPrivilege 4424 vbc.exe Token: SeImpersonatePrivilege 4424 vbc.exe Token: SeTcbPrivilege 4424 vbc.exe Token: SeChangeNotifyPrivilege 4424 vbc.exe Token: SeCreateTokenPrivilege 4424 vbc.exe Token: SeBackupPrivilege 4424 vbc.exe Token: SeRestorePrivilege 4424 vbc.exe Token: SeIncreaseQuotaPrivilege 4424 vbc.exe Token: SeAssignPrimaryTokenPrivilege 4424 vbc.exe Token: SeImpersonatePrivilege 4424 vbc.exe Token: SeTcbPrivilege 4424 vbc.exe Token: SeChangeNotifyPrivilege 4424 vbc.exe Token: SeCreateTokenPrivilege 4424 vbc.exe Token: SeBackupPrivilege 4424 vbc.exe Token: SeRestorePrivilege 4424 vbc.exe Token: SeIncreaseQuotaPrivilege 4424 vbc.exe Token: SeAssignPrimaryTokenPrivilege 4424 vbc.exe Token: SeImpersonatePrivilege 4424 vbc.exe Token: SeTcbPrivilege 4424 vbc.exe Token: SeChangeNotifyPrivilege 4424 vbc.exe Token: SeCreateTokenPrivilege 4424 vbc.exe Token: SeBackupPrivilege 4424 vbc.exe Token: SeRestorePrivilege 4424 vbc.exe Token: SeIncreaseQuotaPrivilege 4424 vbc.exe Token: SeAssignPrimaryTokenPrivilege 4424 vbc.exe Token: SeImpersonatePrivilege 4424 vbc.exe Token: SeTcbPrivilege 4424 vbc.exe Token: SeChangeNotifyPrivilege 4424 vbc.exe Token: SeCreateTokenPrivilege 4424 vbc.exe Token: SeBackupPrivilege 4424 vbc.exe Token: SeRestorePrivilege 4424 vbc.exe Token: SeIncreaseQuotaPrivilege 4424 vbc.exe Token: SeAssignPrimaryTokenPrivilege 4424 vbc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2252 Ecard.exe 2252 Ecard.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2252 wrote to memory of 4424 2252 Ecard.exe 83 PID 2252 wrote to memory of 4424 2252 Ecard.exe 83 PID 2252 wrote to memory of 4424 2252 Ecard.exe 83 PID 2252 wrote to memory of 4424 2252 Ecard.exe 83 PID 2252 wrote to memory of 4424 2252 Ecard.exe 83 PID 2252 wrote to memory of 4424 2252 Ecard.exe 83 PID 2252 wrote to memory of 4424 2252 Ecard.exe 83 PID 2252 wrote to memory of 4424 2252 Ecard.exe 83 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ecard.exe"C:\Users\Admin\AppData\Local\Temp\Ecard.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
PID:4424
-