Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 08:46
Behavioral task
behavioral1
Sample
7e860a4e29ec5db1a4178a33019254ea.exe
Resource
win7-20231129-en
General
-
Target
7e860a4e29ec5db1a4178a33019254ea.exe
-
Size
5.6MB
-
MD5
7e860a4e29ec5db1a4178a33019254ea
-
SHA1
c8ccabfae4b83851b9384a01d4ec3eeed2d74167
-
SHA256
687be569737d64b043602602d674a718540bd04d2fc76d705aceb6fd158f7754
-
SHA512
77c3d0948e23d99076284de8e9dc72d645a5d4d1cd93284f065c8e05c44c12cd7b6e6ed092ba17e2fd0d18fe9a4821dca15c216adca1089e048bbe56686fe470
-
SSDEEP
98304:G19EN760TEEnbnr3NKFkP33pMHK0kuNwMpxDQxOGpmqtl4HHA7FyD/EzruNlvK:GvEN7LTdrdJPH2H+pMXQ7pEnA7FyD/Mp
Malware Config
Signatures
-
Detects Echelon Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1740-33-0x00000000000A0000-0x0000000000EDE000-memory.dmp family_echelon behavioral1/memory/1740-34-0x00000000000A0000-0x0000000000EDE000-memory.dmp family_echelon -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
7e860a4e29ec5db1a4178a33019254ea.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7e860a4e29ec5db1a4178a33019254ea.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
7e860a4e29ec5db1a4178a33019254ea.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7e860a4e29ec5db1a4178a33019254ea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7e860a4e29ec5db1a4178a33019254ea.exe -
Processes:
resource yara_rule behavioral1/memory/1740-33-0x00000000000A0000-0x0000000000EDE000-memory.dmp themida behavioral1/memory/1740-34-0x00000000000A0000-0x0000000000EDE000-memory.dmp themida -
Processes:
7e860a4e29ec5db1a4178a33019254ea.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7e860a4e29ec5db1a4178a33019254ea.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
7e860a4e29ec5db1a4178a33019254ea.exepid Process 1740 7e860a4e29ec5db1a4178a33019254ea.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2728 1740 WerFault.exe 27 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7e860a4e29ec5db1a4178a33019254ea.exedescription pid Process Token: SeDebugPrivilege 1740 7e860a4e29ec5db1a4178a33019254ea.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
7e860a4e29ec5db1a4178a33019254ea.exedescription pid Process procid_target PID 1740 wrote to memory of 2728 1740 7e860a4e29ec5db1a4178a33019254ea.exe 29 PID 1740 wrote to memory of 2728 1740 7e860a4e29ec5db1a4178a33019254ea.exe 29 PID 1740 wrote to memory of 2728 1740 7e860a4e29ec5db1a4178a33019254ea.exe 29 PID 1740 wrote to memory of 2728 1740 7e860a4e29ec5db1a4178a33019254ea.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e860a4e29ec5db1a4178a33019254ea.exe"C:\Users\Admin\AppData\Local\Temp\7e860a4e29ec5db1a4178a33019254ea.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 12882⤵
- Program crash
PID:2728
-