Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    11-05-2022 02:43

General

  • Target

    8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe

  • Size

    522KB

  • MD5

    1eaced72fb7d641ae89622e325b00226

  • SHA1

    3bf9aae121eb77ffc00e69d0331a100604bf13e8

  • SHA256

    8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a

  • SHA512

    a89770a240ffa337d54182018b161055f09f499d5bd9edab9a265bc8a34183d24e2ba21d866edf6055e23070071ba64dcb948580dad652b268187030b630b88e

Malware Config

Signatures

  • Echelon

    Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

  • Echelon log file 1 IoCs

    Detects a log file produced by Echelon.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe
    "C:\Users\Admin\AppData\Local\Temp\8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • outlook_office_path
    • outlook_win_path
    PID:4628
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 4628 -s 1928
      2⤵
      • Program crash
      PID:1244
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 416 -p 4628 -ip 4628
    1⤵
      PID:2556

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4628-130-0x0000000000870000-0x00000000008F8000-memory.dmp

      Filesize

      544KB

    • memory/4628-131-0x00007FF9AD3C0000-0x00007FF9ADE81000-memory.dmp

      Filesize

      10.8MB

    • memory/4628-132-0x000000001B4D9000-0x000000001B4DF000-memory.dmp

      Filesize

      24KB

    • memory/4628-133-0x000000001E0D0000-0x000000001E0D4000-memory.dmp

      Filesize

      16KB

    • memory/4628-134-0x000000001E0D4000-0x000000001E0D7000-memory.dmp

      Filesize

      12KB

    • memory/4628-135-0x000000001E0D7000-0x000000001E0DC000-memory.dmp

      Filesize

      20KB

    • memory/4628-136-0x000000001E0DC000-0x000000001E0E1000-memory.dmp

      Filesize

      20KB

    • memory/4628-137-0x000000001E0E1000-0x000000001E0E6000-memory.dmp

      Filesize

      20KB

    • memory/4628-138-0x000000001E0E6000-0x000000001E0EB000-memory.dmp

      Filesize

      20KB

    • memory/4628-139-0x000000001E0EB000-0x000000001E0F4000-memory.dmp

      Filesize

      36KB

    • memory/4628-140-0x000000001B4D8000-0x000000001B4DB000-memory.dmp

      Filesize

      12KB

    • memory/4628-141-0x000000001E0F4000-0x000000001E0FD000-memory.dmp

      Filesize

      36KB

    • memory/4628-142-0x000000001E0D1000-0x000000001E0E6000-memory.dmp

      Filesize

      84KB

    • memory/4628-143-0x000000001B4D7000-0x000000001B4DB000-memory.dmp

      Filesize

      16KB

    • memory/4628-144-0x000000001E0D1000-0x000000001E0D4000-memory.dmp

      Filesize

      12KB

    • memory/4628-145-0x000000001E0D3000-0x000000001E0E6000-memory.dmp

      Filesize

      76KB

    • memory/4628-146-0x000000001E0F7000-0x000000001E0FC000-memory.dmp

      Filesize

      20KB

    • memory/4628-147-0x0000000001360000-0x0000000001382000-memory.dmp

      Filesize

      136KB

    • memory/4628-148-0x000000001B4D7000-0x000000001B4DB000-memory.dmp

      Filesize

      16KB

    • memory/4628-149-0x000000001E0ED000-0x000000001E0F4000-memory.dmp

      Filesize

      28KB