Analysis
-
max time kernel
3s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 14:34
Behavioral task
behavioral1
Sample
56b9cbe1556dd419bec522a473a70a20.exe
Resource
win7-20231215-en
12 signatures
150 seconds
General
-
Target
56b9cbe1556dd419bec522a473a70a20.exe
-
Size
674KB
-
MD5
56b9cbe1556dd419bec522a473a70a20
-
SHA1
6077796a394c2235f87d02dfd14096ee3cc2fe78
-
SHA256
e74ba4cb7a8950928fb8bc8f3089ca49c295dd4197afb89ddcee666685da6c0a
-
SHA512
eccfb376ab6bbbe79e24b21fdd1c6c682675db04bb7b5574853eca30d79d9ee571a70ac3f7c29c933c2cbf906faca4c7cbbedd62e83194351f856bacf03bb57e
-
SSDEEP
12288:ILfpljJgZSsAjAuYcVWfs6MDMVqfBdcmDBuvXEVd:0JwcAuv0fKMVqJdczEVd
Malware Config
Signatures
-
Detects Echelon Stealer payload 1 IoCs
resource yara_rule behavioral2/memory/4384-0-0x000001CD61200000-0x000001CD612AE000-memory.dmp family_echelon -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 31 api.ipify.org 35 ip-api.com 30 api.ipify.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
pid Process 4384 56b9cbe1556dd419bec522a473a70a20.exe 4384 56b9cbe1556dd419bec522a473a70a20.exe 4384 56b9cbe1556dd419bec522a473a70a20.exe 4384 56b9cbe1556dd419bec522a473a70a20.exe 4384 56b9cbe1556dd419bec522a473a70a20.exe 4384 56b9cbe1556dd419bec522a473a70a20.exe 4384 56b9cbe1556dd419bec522a473a70a20.exe 4384 56b9cbe1556dd419bec522a473a70a20.exe 4384 56b9cbe1556dd419bec522a473a70a20.exe 4384 56b9cbe1556dd419bec522a473a70a20.exe 4384 56b9cbe1556dd419bec522a473a70a20.exe 4384 56b9cbe1556dd419bec522a473a70a20.exe 4384 56b9cbe1556dd419bec522a473a70a20.exe 4384 56b9cbe1556dd419bec522a473a70a20.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4384 56b9cbe1556dd419bec522a473a70a20.exe 4384 56b9cbe1556dd419bec522a473a70a20.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4384 56b9cbe1556dd419bec522a473a70a20.exe