Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    25-10-2020 22:31

General

  • Target

    among.exe

  • Size

    3.0MB

  • MD5

    bd089566ea96fcbff16b58166467c04e

  • SHA1

    600d2248a7a21d13dd407a3c5769c11da46f4269

  • SHA256

    254065f8c104909b9539cfeb5b1fa5641b5871114cb3185be5f533022f7e341c

  • SHA512

    c9f96b23b7e62f65579c01ad95543992c187b2c92c6d5935af8d6d5368ec1e91becfc23e6c4e9ad84d8077090392a0c29d29a3c2b350876db5760d7131095ccb

Malware Config

Signatures

  • Echelon

    Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

  • Echelon log file 1 IoCs

    Detects a log file produced by Echelon.

  • Blacklisted process makes network request 4 IoCs
  • Executes dropped EXE 3 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • JavaScript code in executable 1 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 6 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\among.exe
    "C:\Users\Admin\AppData\Local\Temp\among.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\among_us_hack_492781.msi"
      2⤵
      • Blacklisted process makes network request
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1248
    • C:\Users\Admin\AppData\Local\Temp\File.exe
      "C:\Users\Admin\AppData\Local\Temp\File.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:840
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 840 -s 1140
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1420
    • C:\Users\Admin\AppData\Local\Temp\lol.scr
      "C:\Users\Admin\AppData\Local\Temp\lol.scr" /S
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1412
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blacklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Users\Admin\AppData\Roaming\NativeDorstenia\NativeDorstenia.exe
      "C:\Users\Admin\AppData\Roaming\NativeDorstenia\NativeDorstenia.exe" "C:\Users\Admin\AppData\Local\Temp\among_us_hack_492781.msi"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1448

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0972B7C417F696E06E186AEB26286F01_D0A15851E78F28E33467584A33BA5369
    MD5

    7ea8bd94e53a071fea4b34ee330904e6

    SHA1

    3898e4991531c663589c48a7f48da1519761c736

    SHA256

    122d22c599b82bffa8102a6f57574dd94212e3e3b351892b67a31d2d2baf5a02

    SHA512

    943b0b6404ff02d3eb5a04fedda258aebc942f143ec01cb080102d96e018509ba87b305842771f30a525362e51149cdb37d2bb8ffad87366c72375653f6e9eab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8828F39C7C0CE9A14B25C7EB321181BA_3DF94EB797096674F7793A562A778C5F
    MD5

    31557aefdc59dbcca3ce81d4e3b1970f

    SHA1

    5c81cd4496ff5651013a30998b9a565c2347a005

    SHA256

    e752ca0c6bac74541a9a51358123cf436433320e8e7f3e1c737fb57c323dde07

    SHA512

    62cd65b76a7813fc6b666483c65e63185893e90a78269aeff1ac8e662b930910018f16f7b910648bec152c6ebcd7737e6145b1171c198b80871117bb533a50cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0972B7C417F696E06E186AEB26286F01_D0A15851E78F28E33467584A33BA5369
    MD5

    ca55188969690b7a197da918e90dbb80

    SHA1

    77667a39b3991f171d4ba9e43065a591682558df

    SHA256

    decc0beb647f092423f3efd8239506df4e19aa838822c7d5f494357c8c955368

    SHA512

    53750c5273053bf3cbd7267964121b6e753bf8d96374d5b02405a037a7308d1b4e4a0f90bc2d4dc160149cdee24348ebaa722fc5357e2464fcb4bf6a50929903

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8828F39C7C0CE9A14B25C7EB321181BA_3DF94EB797096674F7793A562A778C5F
    MD5

    16219f6d0358b196b0394a3bd959d05c

    SHA1

    918ed0e9b96532b12cb0526340b8234939cef0a9

    SHA256

    3d021c4588f3afe2f5c34dfb9401fc4c935b3aa893e86306079cd0a10dc6aa94

    SHA512

    96b5cecba6908c8634268ccb72cfe15a3c43bd1df0e611d473376d8c5c104382b3c3d220ef95cbff2d958bc3eb453e7ab839495b930d38da5a8f57a5096a7329

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    248fd1eb1e43edadc556693e09ed7968

    SHA1

    d704bc1e9b5f008a7afc6d1de669f088afbf071d

    SHA256

    b00a6f76008621def2d2de5ad4f9fa1f0369d620eed101ba3bc28e12429eeb5f

    SHA512

    13bda48b3322e489c402b513d7736952cd3dc452ad8bbb14db0cea66645040fc90602eb93c1c96f1be4efa1f3fcabc4c2265e684e785cc07927c3fe9cf59b581

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    990fe0739b83f5b1ed33bed714ccb2c0

    SHA1

    d350f3240782f8c05199eb0e103fd1802cedffa1

    SHA256

    12e86063480d49b28075eced22fa089527cb063e4e68efad1a58ceb53c7c87ea

    SHA512

    49c68c8a6c7a225c1ee99fc741b7e895be44723810564ca481ee42d7753ace1632cf50d55236706d0183537aec302dbf3dcea4f437463df354f79400152fb344

  • C:\Users\Admin\AppData\Local\Temp\File.exe
    MD5

    42d51e625544236266f22b3eebfb2916

    SHA1

    c629b576834ada632f4cb7f1f9a42dcaed775468

    SHA256

    10d9bfb8ffd8604bd88edfa7ec3f70f24f551ad6720016320377afcad9a6f735

    SHA512

    8a340465dcc7cead86908c6286f6eb03ebc0f340c8e9574eb1241dd810c1242b3957260e934fa994bf003c07e0fe7978ea6ec493c076fbccfb4772dc0a37279f

  • C:\Users\Admin\AppData\Local\Temp\File.exe
    MD5

    42d51e625544236266f22b3eebfb2916

    SHA1

    c629b576834ada632f4cb7f1f9a42dcaed775468

    SHA256

    10d9bfb8ffd8604bd88edfa7ec3f70f24f551ad6720016320377afcad9a6f735

    SHA512

    8a340465dcc7cead86908c6286f6eb03ebc0f340c8e9574eb1241dd810c1242b3957260e934fa994bf003c07e0fe7978ea6ec493c076fbccfb4772dc0a37279f

  • C:\Users\Admin\AppData\Local\Temp\among_us_hack_492781.msi
    MD5

    c6bda3eb7bed85863b0c8a2ffed22751

    SHA1

    0c3ed7891da82fd8170b11cb77787de474700b4b

    SHA256

    bbb95f2e2fff202e4c53e2d21b3bb3953d0694c91d87ca5f5a4d54114085f354

    SHA512

    331fd5099f74969792dc857c61a3886e8e0dd39f4adcd304a670e30a0c2d97f5804ef506bc190efe0f54c645a5d35cf4a4da078956a96a86d56d7d4f237cd9fc

  • C:\Users\Admin\AppData\Local\Temp\lol.scr
    MD5

    e48fdb255f9c2500763846100ff1a9e7

    SHA1

    a029408c57765551a71082c5fbff2c43fbaa75d2

    SHA256

    4236d4e30db63172f84a53fd501253b010564e65703059125362ffd37c3c677b

    SHA512

    55940093d23569e21bb090dbb4277712e58e705d7805a7e9e36481fbda09064224cfb21d9bda1feb9737ee593bb692487f8b7b0149dd6b7a002102c6fb6e86d4

  • C:\Users\Admin\AppData\Local\Temp\lol.scr
    MD5

    e48fdb255f9c2500763846100ff1a9e7

    SHA1

    a029408c57765551a71082c5fbff2c43fbaa75d2

    SHA256

    4236d4e30db63172f84a53fd501253b010564e65703059125362ffd37c3c677b

    SHA512

    55940093d23569e21bb090dbb4277712e58e705d7805a7e9e36481fbda09064224cfb21d9bda1feb9737ee593bb692487f8b7b0149dd6b7a002102c6fb6e86d4

  • C:\Users\Admin\AppData\Roaming\NativeDorstenia\NativeDorstenia.exe
    MD5

    a4ca15d48f389c223c9d1d9a04ca0e44

    SHA1

    74ca1174d182c70f249767d1fa93c47fa9bd50be

    SHA256

    278b73121a224e100d81ef238daa93effb3b38d0340beb217f06b00ed2b2b276

    SHA512

    113a2dc7d49055786b36dd992ace378da84b119e10ac80b21f7579f8da8b5084370a580a44a49dc348be863cfc761bcdf8e2fdeb293cf8eb9b65fa9ecc25f766

  • \Users\Admin\AppData\Local\Temp\File.exe
    MD5

    42d51e625544236266f22b3eebfb2916

    SHA1

    c629b576834ada632f4cb7f1f9a42dcaed775468

    SHA256

    10d9bfb8ffd8604bd88edfa7ec3f70f24f551ad6720016320377afcad9a6f735

    SHA512

    8a340465dcc7cead86908c6286f6eb03ebc0f340c8e9574eb1241dd810c1242b3957260e934fa994bf003c07e0fe7978ea6ec493c076fbccfb4772dc0a37279f

  • \Users\Admin\AppData\Local\Temp\lol.scr
    MD5

    e48fdb255f9c2500763846100ff1a9e7

    SHA1

    a029408c57765551a71082c5fbff2c43fbaa75d2

    SHA256

    4236d4e30db63172f84a53fd501253b010564e65703059125362ffd37c3c677b

    SHA512

    55940093d23569e21bb090dbb4277712e58e705d7805a7e9e36481fbda09064224cfb21d9bda1feb9737ee593bb692487f8b7b0149dd6b7a002102c6fb6e86d4

  • \Users\Admin\AppData\Local\Temp\lol.scr
    MD5

    e48fdb255f9c2500763846100ff1a9e7

    SHA1

    a029408c57765551a71082c5fbff2c43fbaa75d2

    SHA256

    4236d4e30db63172f84a53fd501253b010564e65703059125362ffd37c3c677b

    SHA512

    55940093d23569e21bb090dbb4277712e58e705d7805a7e9e36481fbda09064224cfb21d9bda1feb9737ee593bb692487f8b7b0149dd6b7a002102c6fb6e86d4

  • memory/840-98-0x0000000000000000-mapping.dmp
  • memory/840-102-0x0000000000000000-mapping.dmp
  • memory/840-120-0x0000000000000000-mapping.dmp
  • memory/840-5-0x000007FEF62A0000-0x000007FEF6C8C000-memory.dmp
    Filesize

    9.9MB

  • memory/840-121-0x0000000000000000-mapping.dmp
  • memory/840-31-0x0000000000F10000-0x0000000000F11000-memory.dmp
    Filesize

    4KB

  • memory/840-119-0x0000000000000000-mapping.dmp
  • memory/840-117-0x0000000000000000-mapping.dmp
  • memory/840-35-0x0000000000350000-0x0000000000351000-memory.dmp
    Filesize

    4KB

  • memory/840-118-0x0000000000000000-mapping.dmp
  • memory/840-116-0x0000000000000000-mapping.dmp
  • memory/840-38-0x000000001B6A0000-0x000000001B960000-memory.dmp
    Filesize

    2.8MB

  • memory/840-39-0x00000000003D0000-0x00000000003D1000-memory.dmp
    Filesize

    4KB

  • memory/840-115-0x0000000000000000-mapping.dmp
  • memory/840-114-0x0000000000000000-mapping.dmp
  • memory/840-112-0x0000000000000000-mapping.dmp
  • memory/840-113-0x0000000000000000-mapping.dmp
  • memory/840-110-0x0000000000000000-mapping.dmp
  • memory/840-111-0x0000000000000000-mapping.dmp
  • memory/840-108-0x0000000000000000-mapping.dmp
  • memory/840-109-0x0000000000000000-mapping.dmp
  • memory/840-106-0x0000000000000000-mapping.dmp
  • memory/840-107-0x0000000000000000-mapping.dmp
  • memory/840-105-0x0000000000000000-mapping.dmp
  • memory/840-104-0x0000000000000000-mapping.dmp
  • memory/840-103-0x0000000000000000-mapping.dmp
  • memory/840-2-0x0000000000000000-mapping.dmp
  • memory/840-100-0x0000000000000000-mapping.dmp
  • memory/840-101-0x0000000000000000-mapping.dmp
  • memory/840-70-0x0000000000000000-mapping.dmp
  • memory/840-71-0x0000000000000000-mapping.dmp
  • memory/840-72-0x0000000000000000-mapping.dmp
  • memory/840-73-0x0000000000000000-mapping.dmp
  • memory/840-74-0x0000000000000000-mapping.dmp
  • memory/840-75-0x0000000000000000-mapping.dmp
  • memory/840-76-0x0000000000000000-mapping.dmp
  • memory/840-77-0x0000000000000000-mapping.dmp
  • memory/840-78-0x0000000000000000-mapping.dmp
  • memory/840-80-0x0000000000000000-mapping.dmp
  • memory/840-79-0x0000000000000000-mapping.dmp
  • memory/840-81-0x0000000000000000-mapping.dmp
  • memory/840-82-0x0000000000000000-mapping.dmp
  • memory/840-83-0x0000000000000000-mapping.dmp
  • memory/840-84-0x0000000000000000-mapping.dmp
  • memory/840-85-0x0000000000000000-mapping.dmp
  • memory/840-87-0x0000000000000000-mapping.dmp
  • memory/840-86-0x0000000000000000-mapping.dmp
  • memory/840-92-0x0000000000000000-mapping.dmp
  • memory/840-91-0x0000000000000000-mapping.dmp
  • memory/840-90-0x0000000000000000-mapping.dmp
  • memory/840-89-0x0000000000000000-mapping.dmp
  • memory/840-88-0x0000000000000000-mapping.dmp
  • memory/840-94-0x0000000000000000-mapping.dmp
  • memory/840-93-0x0000000000000000-mapping.dmp
  • memory/840-95-0x0000000000000000-mapping.dmp
  • memory/840-99-0x0000000000000000-mapping.dmp
  • memory/840-97-0x0000000000000000-mapping.dmp
  • memory/1248-13-0x0000000002700000-0x0000000002704000-memory.dmp
    Filesize

    16KB

  • memory/1248-19-0x0000000003340000-0x0000000003344000-memory.dmp
    Filesize

    16KB

  • memory/1248-20-0x0000000003340000-0x0000000003344000-memory.dmp
    Filesize

    16KB

  • memory/1248-16-0x0000000003340000-0x0000000003344000-memory.dmp
    Filesize

    16KB

  • memory/1248-18-0x0000000003860000-0x0000000003864000-memory.dmp
    Filesize

    16KB

  • memory/1248-64-0x0000000002300000-0x0000000002304000-memory.dmp
    Filesize

    16KB

  • memory/1248-0-0x0000000000000000-mapping.dmp
  • memory/1248-24-0x0000000003340000-0x0000000003344000-memory.dmp
    Filesize

    16KB

  • memory/1248-14-0x0000000002700000-0x0000000002704000-memory.dmp
    Filesize

    16KB

  • memory/1412-8-0x0000000000000000-mapping.dmp
  • memory/1412-11-0x000007FEF62A0000-0x000007FEF6C8C000-memory.dmp
    Filesize

    9.9MB

  • memory/1412-30-0x0000000000FD0000-0x0000000000FD1000-memory.dmp
    Filesize

    4KB

  • memory/1412-34-0x0000000000140000-0x0000000000141000-memory.dmp
    Filesize

    4KB

  • memory/1412-36-0x0000000000390000-0x00000000003DA000-memory.dmp
    Filesize

    296KB

  • memory/1412-37-0x0000000000150000-0x0000000000151000-memory.dmp
    Filesize

    4KB

  • memory/1420-66-0x0000000000000000-mapping.dmp
  • memory/1420-67-0x0000000001DD0000-0x0000000001DE1000-memory.dmp
    Filesize

    68KB

  • memory/1420-96-0x0000000002A70000-0x0000000002A81000-memory.dmp
    Filesize

    68KB

  • memory/1448-59-0x0000000000000000-mapping.dmp
  • memory/1784-63-0x0000000002790000-0x0000000002794000-memory.dmp
    Filesize

    16KB

  • memory/1784-45-0x0000000001160000-0x0000000001164000-memory.dmp
    Filesize

    16KB

  • memory/1784-46-0x0000000000300000-0x0000000000304000-memory.dmp
    Filesize

    16KB

  • memory/1784-47-0x0000000000300000-0x0000000000304000-memory.dmp
    Filesize

    16KB

  • memory/1784-61-0x0000000002790000-0x0000000002794000-memory.dmp
    Filesize

    16KB