Analysis

  • max time kernel
    143s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 01:13

General

  • Target

    22a4e3fe84c4bb3e79b289ac053c77d1.exe

  • Size

    1.9MB

  • MD5

    22a4e3fe84c4bb3e79b289ac053c77d1

  • SHA1

    7fe44f740fb2eaf7ffb85520e06e4149fa443d84

  • SHA256

    f14c125600acad1e6aa330deb5aca520f3fa83e747d2e094d4a337e83b413da5

  • SHA512

    86d6e0ac0613f33b47e59f2c8f9fa8d7bf34b3bfd41bb655e6fb39e133e7d4ee2183c95852edaf173a1e6a089943355c87f17a297672f07db5b56a422ecc769c

  • SSDEEP

    24576:C3q4nvYveRLfRq3hwwy8nCAlmd/l/hAot8rhhUF54clNf7+6uHAW92zt/sWu2BSW:74nQe5qWGYlZA88to54clgLH+tkWJ0

Malware Config

Signatures

  • Echelon

    Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22a4e3fe84c4bb3e79b289ac053c77d1.exe
    "C:\Users\Admin\AppData\Local\Temp\22a4e3fe84c4bb3e79b289ac053c77d1.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:5100

Network

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5100-0-0x00000217EAC70000-0x00000217EAF84000-memory.dmp
    Filesize

    3.1MB

  • memory/5100-1-0x00007FFBE9770000-0x00007FFBEA231000-memory.dmp
    Filesize

    10.8MB

  • memory/5100-2-0x00000217ED570000-0x00000217ED580000-memory.dmp
    Filesize

    64KB

  • memory/5100-3-0x00000217EB330000-0x00000217EB331000-memory.dmp
    Filesize

    4KB

  • memory/5100-4-0x00000217EB330000-0x00000217EB331000-memory.dmp
    Filesize

    4KB

  • memory/5100-5-0x00000217ED580000-0x00000217ED5F6000-memory.dmp
    Filesize

    472KB

  • memory/5100-48-0x00007FFBE9770000-0x00007FFBEA231000-memory.dmp
    Filesize

    10.8MB

  • memory/5100-49-0x00000217ED570000-0x00000217ED580000-memory.dmp
    Filesize

    64KB

  • memory/5100-50-0x00000217EB330000-0x00000217EB331000-memory.dmp
    Filesize

    4KB

  • memory/5100-57-0x00007FFBE9770000-0x00007FFBEA231000-memory.dmp
    Filesize

    10.8MB