Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17-01-2024 00:17
Static task
static1
Behavioral task
behavioral1
Sample
613dda690cc2ccaedd7660416478b064.exe
Resource
win7-20231215-en
General
-
Target
613dda690cc2ccaedd7660416478b064.exe
-
Size
5.1MB
-
MD5
613dda690cc2ccaedd7660416478b064
-
SHA1
79e8b6e18c3ee35cc2909843c17a93c6ed3b0a94
-
SHA256
e9973498e9c6b86776c6bc4bd379b531e3390a43520421652173d0b5bcf0f730
-
SHA512
5b5a0c0e85cf7746df0d296ffe9bbe0e4c34be36a3e21d22e0ff32f4d1ae0f171c3ca16a8a5c7d92acdc56698df76220e74d35d151a18aa8b9549e1d7ed29b4f
-
SSDEEP
98304:isZd4DGVev+VxBEol6uHbrxXvOpdxyK5XL8jCp:7DM+VxO7unYpTf5XLX
Malware Config
Signatures
-
Detects Echelon Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1700-8-0x0000000000290000-0x00000000007AE000-memory.dmp family_echelon behavioral1/memory/1700-10-0x0000000000290000-0x00000000007AE000-memory.dmp family_echelon -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
613dda690cc2ccaedd7660416478b064.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 613dda690cc2ccaedd7660416478b064.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
613dda690cc2ccaedd7660416478b064.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 613dda690cc2ccaedd7660416478b064.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 613dda690cc2ccaedd7660416478b064.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
613dda690cc2ccaedd7660416478b064.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Wine 613dda690cc2ccaedd7660416478b064.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
613dda690cc2ccaedd7660416478b064.exepid process 1700 613dda690cc2ccaedd7660416478b064.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2052 1700 WerFault.exe 613dda690cc2ccaedd7660416478b064.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
613dda690cc2ccaedd7660416478b064.exepid process 1700 613dda690cc2ccaedd7660416478b064.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
613dda690cc2ccaedd7660416478b064.exedescription pid process Token: SeDebugPrivilege 1700 613dda690cc2ccaedd7660416478b064.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
613dda690cc2ccaedd7660416478b064.exedescription pid process target process PID 1700 wrote to memory of 2052 1700 613dda690cc2ccaedd7660416478b064.exe WerFault.exe PID 1700 wrote to memory of 2052 1700 613dda690cc2ccaedd7660416478b064.exe WerFault.exe PID 1700 wrote to memory of 2052 1700 613dda690cc2ccaedd7660416478b064.exe WerFault.exe PID 1700 wrote to memory of 2052 1700 613dda690cc2ccaedd7660416478b064.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\613dda690cc2ccaedd7660416478b064.exe"C:\Users\Admin\AppData\Local\Temp\613dda690cc2ccaedd7660416478b064.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 15242⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1700-0-0x0000000000290000-0x00000000007AE000-memory.dmpFilesize
5.1MB
-
memory/1700-1-0x0000000076F70000-0x0000000076F72000-memory.dmpFilesize
8KB
-
memory/1700-2-0x0000000074A40000-0x0000000074B30000-memory.dmpFilesize
960KB
-
memory/1700-3-0x0000000075000000-0x00000000750CC000-memory.dmpFilesize
816KB
-
memory/1700-5-0x0000000074840000-0x0000000074849000-memory.dmpFilesize
36KB
-
memory/1700-4-0x0000000074660000-0x00000000746AA000-memory.dmpFilesize
296KB
-
memory/1700-6-0x0000000000290000-0x00000000007AE000-memory.dmpFilesize
5.1MB
-
memory/1700-7-0x0000000073EF0000-0x00000000745DE000-memory.dmpFilesize
6.9MB
-
memory/1700-8-0x0000000000290000-0x00000000007AE000-memory.dmpFilesize
5.1MB
-
memory/1700-9-0x0000000073D70000-0x0000000073DF0000-memory.dmpFilesize
512KB
-
memory/1700-10-0x0000000000290000-0x00000000007AE000-memory.dmpFilesize
5.1MB
-
memory/1700-11-0x0000000073CD0000-0x0000000073CDB000-memory.dmpFilesize
44KB
-
memory/1700-12-0x0000000075900000-0x0000000075983000-memory.dmpFilesize
524KB
-
memory/1700-13-0x0000000073A90000-0x0000000073A9E000-memory.dmpFilesize
56KB
-
memory/1700-14-0x0000000073B40000-0x0000000073B57000-memory.dmpFilesize
92KB
-
memory/1700-15-0x0000000073A80000-0x0000000073A8A000-memory.dmpFilesize
40KB
-
memory/1700-16-0x0000000073A40000-0x0000000073A4F000-memory.dmpFilesize
60KB
-
memory/1700-17-0x0000000008170000-0x00000000081B0000-memory.dmpFilesize
256KB
-
memory/1700-18-0x0000000074A40000-0x0000000074B30000-memory.dmpFilesize
960KB
-
memory/1700-19-0x0000000074660000-0x00000000746AA000-memory.dmpFilesize
296KB
-
memory/1700-20-0x0000000073640000-0x0000000073657000-memory.dmpFilesize
92KB
-
memory/1700-21-0x0000000073EF0000-0x00000000745DE000-memory.dmpFilesize
6.9MB
-
memory/1700-23-0x0000000073610000-0x000000007361D000-memory.dmpFilesize
52KB
-
memory/1700-22-0x00000000733D0000-0x0000000073422000-memory.dmpFilesize
328KB
-
memory/1700-24-0x000000006FA10000-0x000000006FA68000-memory.dmpFilesize
352KB
-
memory/1700-25-0x0000000075530000-0x0000000075557000-memory.dmpFilesize
156KB
-
memory/1700-26-0x0000000073D70000-0x0000000073DF0000-memory.dmpFilesize
512KB
-
memory/1700-28-0x0000000073B40000-0x0000000073B57000-memory.dmpFilesize
92KB
-
memory/1700-29-0x0000000073A80000-0x0000000073A8A000-memory.dmpFilesize
40KB
-
memory/1700-30-0x0000000073A40000-0x0000000073A4F000-memory.dmpFilesize
60KB
-
memory/1700-32-0x0000000008170000-0x00000000081B0000-memory.dmpFilesize
256KB
-
memory/1700-33-0x000000006FA10000-0x000000006FA68000-memory.dmpFilesize
352KB