Analysis
-
max time kernel
1s -
max time network
86s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 11:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
69c10e8fa7d800c4a24b36dffec2cea7.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
General
-
Target
69c10e8fa7d800c4a24b36dffec2cea7.exe
-
Size
2.4MB
-
MD5
69c10e8fa7d800c4a24b36dffec2cea7
-
SHA1
07bea76542382f9613d4de5da9b36abb3276988d
-
SHA256
562720cf37245f6bdf71692343b7d7ccc2187e45979e957b86407a21aa83854c
-
SHA512
4cd0dbb29192a8ebc31abd673aa7983a6e2f24e89cc684fb720777aaf5a692010c6f800e1f50b9ffbc9dea397d97a91118a0325cfc4337d83cb2296a6b68bd6f
-
SSDEEP
49152:IzecMn91vjBteouiARLrW8oj12yoYBGfUjAIgX2z2r:gu9dNtb4nWpjIYBCv9
Malware Config
Signatures
-
Detects Echelon Stealer payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3364-1-0x0000000000E30000-0x00000000013E6000-memory.dmp family_echelon -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 6 api.ipify.org 28 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
69c10e8fa7d800c4a24b36dffec2cea7.exepid Process 3364 69c10e8fa7d800c4a24b36dffec2cea7.exe 3364 69c10e8fa7d800c4a24b36dffec2cea7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
69c10e8fa7d800c4a24b36dffec2cea7.exedescription pid Process Token: SeDebugPrivilege 3364 69c10e8fa7d800c4a24b36dffec2cea7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
69c10e8fa7d800c4a24b36dffec2cea7.exepid Process 3364 69c10e8fa7d800c4a24b36dffec2cea7.exe