Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09-03-2022 02:30
Static task
static1
Behavioral task
behavioral1
Sample
14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097.exe
Resource
win10v2004-en-20220113
General
-
Target
14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097.exe
-
Size
4.1MB
-
MD5
fe7cd92b40ea9ebf51959a1b919a20d7
-
SHA1
73bfb575f745c52915fe31fb2e6a2232d5552bdd
-
SHA256
14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097
-
SHA512
2dc856319e9b716e7dbe96051b19128d478ae333411e0d68c13400d02aef69e63006dcfc5640716f9f3a35310184b8a53ef451af411c9f7a9c168bad17d4a9f0
Malware Config
Signatures
-
Echelon log file 1 IoCs
Detects a log file produced by Echelon.
yara_rule echelon_log_file -
Executes dropped EXE 2 IoCs
pid Process 1316 CDS.exe 1516 crypted.exe -
Loads dropped DLL 8 IoCs
pid Process 1600 14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097.exe 1316 CDS.exe 1316 CDS.exe 1316 CDS.exe 1316 CDS.exe 1316 CDS.exe 1316 CDS.exe 1316 CDS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 crypted.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 crypted.exe Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 crypted.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org 6 ip-api.com 8 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1452 1516 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1516 crypted.exe 1516 crypted.exe 1316 CDS.exe 1316 CDS.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1516 crypted.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1316 CDS.exe 1316 CDS.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1316 1600 14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097.exe 27 PID 1600 wrote to memory of 1316 1600 14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097.exe 27 PID 1600 wrote to memory of 1316 1600 14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097.exe 27 PID 1600 wrote to memory of 1316 1600 14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097.exe 27 PID 1600 wrote to memory of 1316 1600 14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097.exe 27 PID 1600 wrote to memory of 1316 1600 14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097.exe 27 PID 1600 wrote to memory of 1316 1600 14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097.exe 27 PID 1316 wrote to memory of 1516 1316 CDS.exe 28 PID 1316 wrote to memory of 1516 1316 CDS.exe 28 PID 1316 wrote to memory of 1516 1316 CDS.exe 28 PID 1316 wrote to memory of 1516 1316 CDS.exe 28 PID 1316 wrote to memory of 1516 1316 CDS.exe 28 PID 1316 wrote to memory of 1516 1316 CDS.exe 28 PID 1316 wrote to memory of 1516 1316 CDS.exe 28 PID 1516 wrote to memory of 1452 1516 crypted.exe 30 PID 1516 wrote to memory of 1452 1516 crypted.exe 30 PID 1516 wrote to memory of 1452 1516 crypted.exe 30 PID 1516 wrote to memory of 1452 1516 crypted.exe 30 PID 1516 wrote to memory of 1452 1516 crypted.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 crypted.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 crypted.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097.exe"C:\Users\Admin\AppData\Local\Temp\14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1516 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1516 -s 15364⤵
- Program crash
PID:1452
-
-
-