Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 20:54
Static task
static1
Behavioral task
behavioral1
Sample
Mist.Buld.exe
Resource
win7v20201028
General
-
Target
Mist.Buld.exe
-
Size
391KB
-
MD5
51083ffcc13fc386b68eaa8117f48a55
-
SHA1
c5a7098f15174be421498cede6c8df8819e98540
-
SHA256
f440c2cc4fc3168c939310c4e90b80d980a4a0d6a42f0596d2676461b02d11e2
-
SHA512
81119315b4d36283d283e2e8cc1b2f59f4a72ac921fa32707fc00cc636c73e324554bcbc92847c3d5b1dea3fa6fcca3c093074be4b7f56e6c4213238a7ad2d89
Malware Config
Signatures
-
Echelon log file 2 IoCs
Detects a log file produced by Echelon.
Processes:
yara_rule echelon_log_file echelon_log_file -
Executes dropped EXE 1 IoCs
Processes:
systems32.exepid process 3860 systems32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api.ipify.org 7 api.ipify.org 17 ip-api.com 26 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4000 schtasks.exe 3596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Mist.Buld.exesystems32.exepid process 576 Mist.Buld.exe 576 Mist.Buld.exe 3860 systems32.exe 3860 systems32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Mist.Buld.exesystems32.exedescription pid process Token: SeDebugPrivilege 576 Mist.Buld.exe Token: SeDebugPrivilege 3860 systems32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Mist.Buld.exesystems32.exedescription pid process target process PID 576 wrote to memory of 4000 576 Mist.Buld.exe schtasks.exe PID 576 wrote to memory of 4000 576 Mist.Buld.exe schtasks.exe PID 3860 wrote to memory of 3596 3860 systems32.exe schtasks.exe PID 3860 wrote to memory of 3596 3860 systems32.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mist.Buld.exe"C:\Users\Admin\AppData\Local\Temp\Mist.Buld.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /tn "Windows Services" /tr "C:\Users\Admin\AppData\Roaming\systems32_bit\systems32.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\systems32_bit\systems32.exeC:\Users\Admin\AppData\Roaming\systems32_bit\systems32.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /tn "Windows Services" /tr "C:\Users\Admin\AppData\Roaming\systems32_bit\systems32.exe" /f2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\systems32_bit\systems32.exeMD5
51083ffcc13fc386b68eaa8117f48a55
SHA1c5a7098f15174be421498cede6c8df8819e98540
SHA256f440c2cc4fc3168c939310c4e90b80d980a4a0d6a42f0596d2676461b02d11e2
SHA51281119315b4d36283d283e2e8cc1b2f59f4a72ac921fa32707fc00cc636c73e324554bcbc92847c3d5b1dea3fa6fcca3c093074be4b7f56e6c4213238a7ad2d89
-
C:\Users\Admin\AppData\Roaming\systems32_bit\systems32.exeMD5
51083ffcc13fc386b68eaa8117f48a55
SHA1c5a7098f15174be421498cede6c8df8819e98540
SHA256f440c2cc4fc3168c939310c4e90b80d980a4a0d6a42f0596d2676461b02d11e2
SHA51281119315b4d36283d283e2e8cc1b2f59f4a72ac921fa32707fc00cc636c73e324554bcbc92847c3d5b1dea3fa6fcca3c093074be4b7f56e6c4213238a7ad2d89
-
memory/576-0-0x00007FFC354A0000-0x00007FFC35E8C000-memory.dmpFilesize
9.9MB
-
memory/576-1-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/576-3-0x0000000002280000-0x0000000002315000-memory.dmpFilesize
596KB
-
memory/576-4-0x0000000002BE0000-0x0000000002C50000-memory.dmpFilesize
448KB
-
memory/3596-13-0x0000000000000000-mapping.dmp
-
memory/3860-8-0x00007FFC354A0000-0x00007FFC35E8C000-memory.dmpFilesize
9.9MB
-
memory/4000-5-0x0000000000000000-mapping.dmp