Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-05-2022 02:43
Static task
static1
Behavioral task
behavioral1
Sample
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe
Resource
win10v2004-20220414-en
General
-
Target
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe
-
Size
522KB
-
MD5
1eaced72fb7d641ae89622e325b00226
-
SHA1
3bf9aae121eb77ffc00e69d0331a100604bf13e8
-
SHA256
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a
-
SHA512
a89770a240ffa337d54182018b161055f09f499d5bd9edab9a265bc8a34183d24e2ba21d866edf6055e23070071ba64dcb948580dad652b268187030b630b88e
Malware Config
Signatures
-
Echelon log file 1 IoCs
Detects a log file produced by Echelon.
Processes:
yara_rule echelon_log_file -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 25 api.ipify.org 75 ip-api.com 77 api.ipify.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
Processes:
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exepid Process 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1244 4628 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exepid Process 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exedescription pid Process Token: SeDebugPrivilege 4628 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe -
outlook_office_path 1 IoCs
Processes:
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe -
outlook_win_path 1 IoCs
Processes:
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe"C:\Users\Admin\AppData\Local\Temp\8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe"1⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4628 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4628 -s 19282⤵
- Program crash
PID:1244
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 416 -p 4628 -ip 46281⤵PID:2556