Analysis
-
max time kernel
28s -
max time network
30s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
05-03-2021 18:22
Static task
static1
Behavioral task
behavioral1
Sample
Build.exe
Resource
win7v20201028
General
-
Target
Build.exe
-
Size
3.4MB
-
MD5
74b5bc34a2b3c3dd453560ee4bcb136a
-
SHA1
c86f8b33e5852b986b41318205e18caf7d0e7f30
-
SHA256
c3ee35c8830cb3f6083fe15cd7325e14edbf77880b227473b6c3e39999b41493
-
SHA512
fb68159225c3c518305413ef483765d063be7367f4c43bd08f11ea1d4d50fa1360407050aaf9792788f1391bae1ba389d9ad642a2a2d711af407006e813a9211
Malware Config
Signatures
-
Echelon log file 1 IoCs
Detects a log file produced by Echelon.
Processes:
yara_rule echelon_log_file -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Build.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Build.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Build.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/384-5-0x0000000000D90000-0x0000000000D91000-memory.dmp themida -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
Build.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Build.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ip-api.com 5 api.ipify.org 6 api.ipify.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Build.exepid process 384 Build.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Build.exepid process 384 Build.exe 384 Build.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Build.exedescription pid process Token: SeDebugPrivilege 384 Build.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Build.exe"C:\Users\Admin\AppData\Local\Temp\Build.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:384