Analysis

  • max time kernel
    40s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08-04-2023 07:05

General

  • Target

    9323e2a6cbf294a47ba3a632ac6d02c7ea0c0d49fbf6582befc574a700b43cea.exe

  • Size

    2.6MB

  • MD5

    7615de772c95e664bd7cdb315205a143

  • SHA1

    e5491ee6f2d7d63953d5ea601ef307d26188afaf

  • SHA256

    9323e2a6cbf294a47ba3a632ac6d02c7ea0c0d49fbf6582befc574a700b43cea

  • SHA512

    0b640cbca39b7955a1b724e6b2ec30a6d899d1401c670f0bfc4955b98797bce01fa1dd11c1777e57137f0c4e1e45022eabe1a430327759b1c48aa070d2b95334

  • SSDEEP

    49152:sB41RPvlrEPdZp32cJ0nxoEXLlivMXfDVOwxlBxj6xIAX:G8PvEnzJhEXZGMXfDVhHBgIg

Malware Config

Signatures

  • Detects Echelon Stealer payload 8 IoCs
  • Echelon

    Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9323e2a6cbf294a47ba3a632ac6d02c7ea0c0d49fbf6582befc574a700b43cea.exe
    "C:\Users\Admin\AppData\Local\Temp\9323e2a6cbf294a47ba3a632ac6d02c7ea0c0d49fbf6582befc574a700b43cea.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Users\Admin\AppData\Roaming\3.exe
      "C:\Users\Admin\AppData\Roaming\3.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Users\Admin\AppData\Roaming\2757132.jpeg
        "C:\Users\Admin\AppData\Roaming\2757132.jpeg"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:616
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EXE1.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EXE1.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1696
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\start.vbs"
            5⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1812
            • C:\Users\Admin\AppData\Roaming\defender.exe
              "C:\Users\Admin\AppData\Roaming\defender.exe" -a verus -o stratum+tcp://eu.luckpool.net:3960 -u RXYt52ECeUztSRZBvaKxL2VLhzeh35ED4s.RIG -p x -t 4
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:920
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c cls
                7⤵
                  PID:1524
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EXE2.exe
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EXE2.exe
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1884
            • C:\Users\Admin\AppData\Roaming\4.exe
              "C:\Users\Admin\AppData\Roaming\4.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:812
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 812 -s 1360
                6⤵
                • Program crash
                PID:1192

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EXE1.exe
      Filesize

      1.5MB

      MD5

      59c26b9bbc70075be49ae7d80e2f5146

      SHA1

      ef75ff7047f26ead38e5647982ae4a4e7204fc60

      SHA256

      d927b4f41513d10671685a8972bc8321ae046596c9d2ca2387d1243be4371db0

      SHA512

      b0fb0aaab5f3d6935a22c9f52264c6ffdbd9859ab98aa1c26d0966351e7cf1e2af6e5a374fa912af1ff7fa12c242836d0493de90d218068e0e20fc515539b50b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EXE1.exe
      Filesize

      1.5MB

      MD5

      59c26b9bbc70075be49ae7d80e2f5146

      SHA1

      ef75ff7047f26ead38e5647982ae4a4e7204fc60

      SHA256

      d927b4f41513d10671685a8972bc8321ae046596c9d2ca2387d1243be4371db0

      SHA512

      b0fb0aaab5f3d6935a22c9f52264c6ffdbd9859ab98aa1c26d0966351e7cf1e2af6e5a374fa912af1ff7fa12c242836d0493de90d218068e0e20fc515539b50b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EXE1.exe
      Filesize

      1.5MB

      MD5

      59c26b9bbc70075be49ae7d80e2f5146

      SHA1

      ef75ff7047f26ead38e5647982ae4a4e7204fc60

      SHA256

      d927b4f41513d10671685a8972bc8321ae046596c9d2ca2387d1243be4371db0

      SHA512

      b0fb0aaab5f3d6935a22c9f52264c6ffdbd9859ab98aa1c26d0966351e7cf1e2af6e5a374fa912af1ff7fa12c242836d0493de90d218068e0e20fc515539b50b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EXE2.exe
      Filesize

      677KB

      MD5

      070073c57a34b8a5f409d405eb9074fb

      SHA1

      56e0cbe08f996ff8c3ae3334b3e711e383f9e142

      SHA256

      eded5497df7c743ee541782b8ffc3317ee456c9077d7106ebf90c0ad5599beba

      SHA512

      de8a73f0bd337bb6f020488469b9700e6b8e0f4f0cfb427734dc379a838986829fef7bf682dd25dd194421898314c7c9678333108d518d24838b26f1aa645e54

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\EXE2.exe
      Filesize

      677KB

      MD5

      070073c57a34b8a5f409d405eb9074fb

      SHA1

      56e0cbe08f996ff8c3ae3334b3e711e383f9e142

      SHA256

      eded5497df7c743ee541782b8ffc3317ee456c9077d7106ebf90c0ad5599beba

      SHA512

      de8a73f0bd337bb6f020488469b9700e6b8e0f4f0cfb427734dc379a838986829fef7bf682dd25dd194421898314c7c9678333108d518d24838b26f1aa645e54

    • C:\Users\Admin\AppData\Roaming\2757132.jpeg
      Filesize

      1.9MB

      MD5

      48ab7d994ff16743bc34404f6282209c

      SHA1

      2384002699b10e0e4fd230cf4b36c75d3fb7c3bc

      SHA256

      3090f3102eb0f9d704e34a5eed66b9c0e3f505f5fb90ddc5ba3054e91eb6713f

      SHA512

      05d66fa8efc235016e12499e6921307a8212457e94e198c015903dacb8d2a6e1a7eb57510e08bc87fe68749a54af7f71a39a1ad5f255f1f6bcab7a48ef381ae0

    • C:\Users\Admin\AppData\Roaming\3.exe
      Filesize

      5.2MB

      MD5

      4bb8922aed2f554aa5457d315a43c760

      SHA1

      5a87d57eb5046e96e56e1e43ba818855fe2c053a

      SHA256

      406445e1f73c0cf1fe809e54842ee915694039373b94230a163ef61a7749f2f6

      SHA512

      b866c8f43edcefa6cc4ec2cbcf22cf94b6b45b12815532ac794a6e42b44d65ad8e0d624313829974820325856d86a884dc85d9c4618fd1ff7283db1a3f2be7ac

    • C:\Users\Admin\AppData\Roaming\3.exe
      Filesize

      5.2MB

      MD5

      4bb8922aed2f554aa5457d315a43c760

      SHA1

      5a87d57eb5046e96e56e1e43ba818855fe2c053a

      SHA256

      406445e1f73c0cf1fe809e54842ee915694039373b94230a163ef61a7749f2f6

      SHA512

      b866c8f43edcefa6cc4ec2cbcf22cf94b6b45b12815532ac794a6e42b44d65ad8e0d624313829974820325856d86a884dc85d9c4618fd1ff7283db1a3f2be7ac

    • C:\Users\Admin\AppData\Roaming\3.exe
      Filesize

      5.2MB

      MD5

      4bb8922aed2f554aa5457d315a43c760

      SHA1

      5a87d57eb5046e96e56e1e43ba818855fe2c053a

      SHA256

      406445e1f73c0cf1fe809e54842ee915694039373b94230a163ef61a7749f2f6

      SHA512

      b866c8f43edcefa6cc4ec2cbcf22cf94b6b45b12815532ac794a6e42b44d65ad8e0d624313829974820325856d86a884dc85d9c4618fd1ff7283db1a3f2be7ac

    • C:\Users\Admin\AppData\Roaming\4.exe
      Filesize

      795KB

      MD5

      56df7a0ea82242ce7e1a58ba8280822b

      SHA1

      0415e883811e56483cbf0a54e9ce3cfedd6e5dd2

      SHA256

      cfca50d3277007bca65275606eb469261ac4d12732c05448a41811b4cde159a7

      SHA512

      ded49ee0228c7e60cc88fba59c6b4f4295aed1237775cbb19e90fb9a96952d2890fe2bbf0920815c98439da29076b22f720934e45cdcfef50458b042dffe4993

    • C:\Users\Admin\AppData\Roaming\4.exe
      Filesize

      795KB

      MD5

      56df7a0ea82242ce7e1a58ba8280822b

      SHA1

      0415e883811e56483cbf0a54e9ce3cfedd6e5dd2

      SHA256

      cfca50d3277007bca65275606eb469261ac4d12732c05448a41811b4cde159a7

      SHA512

      ded49ee0228c7e60cc88fba59c6b4f4295aed1237775cbb19e90fb9a96952d2890fe2bbf0920815c98439da29076b22f720934e45cdcfef50458b042dffe4993

    • C:\Users\Admin\AppData\Roaming\4.exe
      Filesize

      795KB

      MD5

      56df7a0ea82242ce7e1a58ba8280822b

      SHA1

      0415e883811e56483cbf0a54e9ce3cfedd6e5dd2

      SHA256

      cfca50d3277007bca65275606eb469261ac4d12732c05448a41811b4cde159a7

      SHA512

      ded49ee0228c7e60cc88fba59c6b4f4295aed1237775cbb19e90fb9a96952d2890fe2bbf0920815c98439da29076b22f720934e45cdcfef50458b042dffe4993

    • C:\Users\Admin\AppData\Roaming\defender.exe
      Filesize

      791KB

      MD5

      58e92ea3a88e6b00f15c0b8da7d7c270

      SHA1

      2c3b4bcb08f3b5ab2e02f2f184d300d0c5567cab

      SHA256

      580a71f3c0c10e7df4f011f0ce6897e16b176c9e2c6a78a6ee7ab292633d6da0

      SHA512

      cf205fd978b814bf09f13446222b9c9f5c07072d294798e829f9a810fd0e9377ae36bb8ed77c5d1efa3b0ebb85a6a6404a55f68d2ebe528e096e2b9d56b9a114

    • C:\Users\Admin\AppData\Roaming\defender.exe
      Filesize

      791KB

      MD5

      58e92ea3a88e6b00f15c0b8da7d7c270

      SHA1

      2c3b4bcb08f3b5ab2e02f2f184d300d0c5567cab

      SHA256

      580a71f3c0c10e7df4f011f0ce6897e16b176c9e2c6a78a6ee7ab292633d6da0

      SHA512

      cf205fd978b814bf09f13446222b9c9f5c07072d294798e829f9a810fd0e9377ae36bb8ed77c5d1efa3b0ebb85a6a6404a55f68d2ebe528e096e2b9d56b9a114

    • C:\Users\Admin\AppData\Roaming\start.vbs
      Filesize

      210B

      MD5

      0ed388e96be16481782876ae6e57790e

      SHA1

      8ea5810dda85821e8737bf4b18c0ea5c1fc55198

      SHA256

      ece530f92f9ba5b045a723ef9321cbae9c4e582c763ccae1e4eda6f03d9b2916

      SHA512

      2c530cce0a9869ffd4032c871ffb736486ddbd580fdc0163dfdc847319c331b38cb62411c89323ebb99243767b34817c2547405d3b61fcf25a3ff5a4bb306dce

    • \Users\Admin\AppData\Roaming\2757132.jpeg
      Filesize

      1.9MB

      MD5

      48ab7d994ff16743bc34404f6282209c

      SHA1

      2384002699b10e0e4fd230cf4b36c75d3fb7c3bc

      SHA256

      3090f3102eb0f9d704e34a5eed66b9c0e3f505f5fb90ddc5ba3054e91eb6713f

      SHA512

      05d66fa8efc235016e12499e6921307a8212457e94e198c015903dacb8d2a6e1a7eb57510e08bc87fe68749a54af7f71a39a1ad5f255f1f6bcab7a48ef381ae0

    • \Users\Admin\AppData\Roaming\3.exe
      Filesize

      5.2MB

      MD5

      4bb8922aed2f554aa5457d315a43c760

      SHA1

      5a87d57eb5046e96e56e1e43ba818855fe2c053a

      SHA256

      406445e1f73c0cf1fe809e54842ee915694039373b94230a163ef61a7749f2f6

      SHA512

      b866c8f43edcefa6cc4ec2cbcf22cf94b6b45b12815532ac794a6e42b44d65ad8e0d624313829974820325856d86a884dc85d9c4618fd1ff7283db1a3f2be7ac

    • \Users\Admin\AppData\Roaming\3.exe
      Filesize

      5.2MB

      MD5

      4bb8922aed2f554aa5457d315a43c760

      SHA1

      5a87d57eb5046e96e56e1e43ba818855fe2c053a

      SHA256

      406445e1f73c0cf1fe809e54842ee915694039373b94230a163ef61a7749f2f6

      SHA512

      b866c8f43edcefa6cc4ec2cbcf22cf94b6b45b12815532ac794a6e42b44d65ad8e0d624313829974820325856d86a884dc85d9c4618fd1ff7283db1a3f2be7ac

    • \Users\Admin\AppData\Roaming\3.exe
      Filesize

      5.2MB

      MD5

      4bb8922aed2f554aa5457d315a43c760

      SHA1

      5a87d57eb5046e96e56e1e43ba818855fe2c053a

      SHA256

      406445e1f73c0cf1fe809e54842ee915694039373b94230a163ef61a7749f2f6

      SHA512

      b866c8f43edcefa6cc4ec2cbcf22cf94b6b45b12815532ac794a6e42b44d65ad8e0d624313829974820325856d86a884dc85d9c4618fd1ff7283db1a3f2be7ac

    • \Users\Admin\AppData\Roaming\3.exe
      Filesize

      5.2MB

      MD5

      4bb8922aed2f554aa5457d315a43c760

      SHA1

      5a87d57eb5046e96e56e1e43ba818855fe2c053a

      SHA256

      406445e1f73c0cf1fe809e54842ee915694039373b94230a163ef61a7749f2f6

      SHA512

      b866c8f43edcefa6cc4ec2cbcf22cf94b6b45b12815532ac794a6e42b44d65ad8e0d624313829974820325856d86a884dc85d9c4618fd1ff7283db1a3f2be7ac

    • \Users\Admin\AppData\Roaming\4.exe
      Filesize

      795KB

      MD5

      56df7a0ea82242ce7e1a58ba8280822b

      SHA1

      0415e883811e56483cbf0a54e9ce3cfedd6e5dd2

      SHA256

      cfca50d3277007bca65275606eb469261ac4d12732c05448a41811b4cde159a7

      SHA512

      ded49ee0228c7e60cc88fba59c6b4f4295aed1237775cbb19e90fb9a96952d2890fe2bbf0920815c98439da29076b22f720934e45cdcfef50458b042dffe4993

    • \Users\Admin\AppData\Roaming\4.exe
      Filesize

      795KB

      MD5

      56df7a0ea82242ce7e1a58ba8280822b

      SHA1

      0415e883811e56483cbf0a54e9ce3cfedd6e5dd2

      SHA256

      cfca50d3277007bca65275606eb469261ac4d12732c05448a41811b4cde159a7

      SHA512

      ded49ee0228c7e60cc88fba59c6b4f4295aed1237775cbb19e90fb9a96952d2890fe2bbf0920815c98439da29076b22f720934e45cdcfef50458b042dffe4993

    • \Users\Admin\AppData\Roaming\4.exe
      Filesize

      795KB

      MD5

      56df7a0ea82242ce7e1a58ba8280822b

      SHA1

      0415e883811e56483cbf0a54e9ce3cfedd6e5dd2

      SHA256

      cfca50d3277007bca65275606eb469261ac4d12732c05448a41811b4cde159a7

      SHA512

      ded49ee0228c7e60cc88fba59c6b4f4295aed1237775cbb19e90fb9a96952d2890fe2bbf0920815c98439da29076b22f720934e45cdcfef50458b042dffe4993

    • \Users\Admin\AppData\Roaming\4.exe
      Filesize

      795KB

      MD5

      56df7a0ea82242ce7e1a58ba8280822b

      SHA1

      0415e883811e56483cbf0a54e9ce3cfedd6e5dd2

      SHA256

      cfca50d3277007bca65275606eb469261ac4d12732c05448a41811b4cde159a7

      SHA512

      ded49ee0228c7e60cc88fba59c6b4f4295aed1237775cbb19e90fb9a96952d2890fe2bbf0920815c98439da29076b22f720934e45cdcfef50458b042dffe4993

    • \Users\Admin\AppData\Roaming\defender.exe
      Filesize

      791KB

      MD5

      58e92ea3a88e6b00f15c0b8da7d7c270

      SHA1

      2c3b4bcb08f3b5ab2e02f2f184d300d0c5567cab

      SHA256

      580a71f3c0c10e7df4f011f0ce6897e16b176c9e2c6a78a6ee7ab292633d6da0

      SHA512

      cf205fd978b814bf09f13446222b9c9f5c07072d294798e829f9a810fd0e9377ae36bb8ed77c5d1efa3b0ebb85a6a6404a55f68d2ebe528e096e2b9d56b9a114

    • \Users\Admin\AppData\Roaming\defender.exe
      Filesize

      791KB

      MD5

      58e92ea3a88e6b00f15c0b8da7d7c270

      SHA1

      2c3b4bcb08f3b5ab2e02f2f184d300d0c5567cab

      SHA256

      580a71f3c0c10e7df4f011f0ce6897e16b176c9e2c6a78a6ee7ab292633d6da0

      SHA512

      cf205fd978b814bf09f13446222b9c9f5c07072d294798e829f9a810fd0e9377ae36bb8ed77c5d1efa3b0ebb85a6a6404a55f68d2ebe528e096e2b9d56b9a114

    • memory/812-118-0x0000000000E70000-0x0000000000F38000-memory.dmp
      Filesize

      800KB

    • memory/812-119-0x000000001A6D0000-0x000000001A750000-memory.dmp
      Filesize

      512KB

    • memory/1504-70-0x0000000001000000-0x000000000152C000-memory.dmp
      Filesize

      5.2MB