Analysis
-
max time kernel
67s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11-05-2022 02:43
Static task
static1
Behavioral task
behavioral1
Sample
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe
Resource
win10v2004-20220414-en
General
-
Target
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe
-
Size
522KB
-
MD5
1eaced72fb7d641ae89622e325b00226
-
SHA1
3bf9aae121eb77ffc00e69d0331a100604bf13e8
-
SHA256
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a
-
SHA512
a89770a240ffa337d54182018b161055f09f499d5bd9edab9a265bc8a34183d24e2ba21d866edf6055e23070071ba64dcb948580dad652b268187030b630b88e
Malware Config
Signatures
-
Echelon log file 1 IoCs
Detects a log file produced by Echelon.
Processes:
yara_rule echelon_log_file -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org 6 ip-api.com 8 api.ipify.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
Processes:
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exepid Process 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1920 1660 WerFault.exe 26 -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exepid Process 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exedescription pid Process Token: SeDebugPrivilege 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exedescription pid Process procid_target PID 1660 wrote to memory of 1920 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 28 PID 1660 wrote to memory of 1920 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 28 PID 1660 wrote to memory of 1920 1660 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 28 -
outlook_office_path 1 IoCs
Processes:
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe -
outlook_win_path 1 IoCs
Processes:
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe"C:\Users\Admin\AppData\Local\Temp\8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe"1⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1660 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1660 -s 16802⤵
- Program crash
PID:1920
-