Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 12:12

General

  • Target

    35c69ab07ba4fd97cb23a0351d7293b6.exe

  • Size

    1.0MB

  • MD5

    35c69ab07ba4fd97cb23a0351d7293b6

  • SHA1

    65c3a14d30364f80ebda6cd1b83c6f9633291c35

  • SHA256

    f6d38b7dda48f70fabd8cf49cfb5191ef8bb4f351629c06ec102630d852da81c

  • SHA512

    072d19611df7a7807a4edff57befe8568132925b493cc7484684b59ef7cee31649eca13adafd3023f0a444241af6e571325880760b534990dfbac6a71bba1a70

  • SSDEEP

    24576:GE6pfUKdYS7gd1OAWUN3YWpLfoYZc4Up3GR6reDPdNyE:GE6pfUHSM1Oz20Gc+TdN

Malware Config

Signatures

  • Detects Echelon Stealer payload 1 IoCs
  • Echelon

    Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35c69ab07ba4fd97cb23a0351d7293b6.exe
    "C:\Users\Admin\AppData\Local\Temp\35c69ab07ba4fd97cb23a0351d7293b6.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\Temp\Crypt.exe
      "C:\Users\Admin\AppData\Local\Temp\Crypt.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3240

Network

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1976-20-0x00007FFFF89C0000-0x00007FFFF9481000-memory.dmp
    Filesize

    10.8MB

  • memory/1976-1-0x00007FFFF89C0000-0x00007FFFF9481000-memory.dmp
    Filesize

    10.8MB

  • memory/1976-3-0x0000000001790000-0x0000000001791000-memory.dmp
    Filesize

    4KB

  • memory/1976-5-0x000000001BD50000-0x000000001BD60000-memory.dmp
    Filesize

    64KB

  • memory/1976-4-0x0000000001790000-0x0000000001791000-memory.dmp
    Filesize

    4KB

  • memory/1976-2-0x0000000001790000-0x00000000017A0000-memory.dmp
    Filesize

    64KB

  • memory/1976-0-0x0000000000E00000-0x0000000001000000-memory.dmp
    Filesize

    2.0MB

  • memory/3240-18-0x000001E8EA540000-0x000001E8EA706000-memory.dmp
    Filesize

    1.8MB

  • memory/3240-19-0x00007FFFF89C0000-0x00007FFFF9481000-memory.dmp
    Filesize

    10.8MB

  • memory/3240-24-0x000001E8ECCA0000-0x000001E8ECCB0000-memory.dmp
    Filesize

    64KB

  • memory/3240-23-0x000001E8EAAB0000-0x000001E8EAAB1000-memory.dmp
    Filesize

    4KB

  • memory/3240-21-0x000001E8EAAB0000-0x000001E8EAAB1000-memory.dmp
    Filesize

    4KB

  • memory/3240-22-0x000001E8EAAB0000-0x000001E8EAAB1000-memory.dmp
    Filesize

    4KB

  • memory/3240-25-0x000001E8ECC30000-0x000001E8ECCA6000-memory.dmp
    Filesize

    472KB

  • memory/3240-46-0x00007FFFF89C0000-0x00007FFFF9481000-memory.dmp
    Filesize

    10.8MB