Analysis

  • max time kernel
    120s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18-01-2024 01:14

General

  • Target

    543b3b925680a46c184e74e1241886b561c9a55970bc1200e19ee377a916f5f0.exe

  • Size

    992KB

  • MD5

    af98b79c86ad3d365c62a482505d45f5

  • SHA1

    f01414990dcf96cbb541278de2c47b31e0a5a095

  • SHA256

    543b3b925680a46c184e74e1241886b561c9a55970bc1200e19ee377a916f5f0

  • SHA512

    08cf29aca9e774a02abc29231ff1e64ff41f46df4532e1fc8f6df92fb28d52c758a2fa23e5c5a5cab1f484c44756356f98815c1a5140e4961ffd937cb9d89416

  • SSDEEP

    24576:jBkVdlYAKSyxe4Pfv7EgUDQK3LZlnphP3C40ffWQ2:Fsv5yxeKfv7EgULZ5/j0feQ2

Score
10/10

Malware Config

Signatures

  • Detects Echelon Stealer payload 1 IoCs
  • Echelon

    Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\543b3b925680a46c184e74e1241886b561c9a55970bc1200e19ee377a916f5f0.exe
    "C:\Users\Admin\AppData\Local\Temp\543b3b925680a46c184e74e1241886b561c9a55970bc1200e19ee377a916f5f0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Echelon.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Echelon.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=Echelon.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2600
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2600 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2756

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    de822d65f6664b22cee5fc913d19e07f

    SHA1

    649197beb20f53e27972b7afdc19c68eda5fb4cd

    SHA256

    9a8ffc811e07d474617dd49baae80e7d07891beda54a35c19c7b2dfb156250b7

    SHA512

    a6001e9ce4b77856e111651ac905ed97874658d11ea209ca106227e324e7fbd92f9140949589877f0e0fdb2b232c61c9bec74a6f3d52077ef83af353a6179652

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    5f9d6d9ae86d06459f92ba3a24a3707e

    SHA1

    bb78fb960fed02a16170aee8db850f43ddc9980f

    SHA256

    e50e976b4acb687f8caaf8adfd7ad882df37acff59647e5080159b87eb53dad7

    SHA512

    93ff572948672f26e61fb3975d0881761fcc1ba6c8a9522b63d792953a73c6f33dfd5aaec4d32713bbb2c054bd359d46a95ceb86ec9fc9d628c5b7b7132c6811

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    2ed0a7f792f6fee0d48256ee4fe9861d

    SHA1

    2fde23364efdd1b2bd481e01611aa92524bff127

    SHA256

    f0c5990da19cc78d11d7355660074f1e3dde25316844532ba42682f00c3d4295

    SHA512

    ff2cf694a5ef0db8e5b59e92cd2b9e9164778126726818491ad7ad64c278921bc6101313158e3a7b85b777c6f17786c5ab841a03b35ee1cde5dfdcbe04ba1e4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b62de1dae40fda165ab168bbe660f515

    SHA1

    31718683651096b4104b3b80471185c2ba20822d

    SHA256

    5826ce3461522734ec3130093c246bef47b931e9177bc4966871210b763a4b34

    SHA512

    79e4a7e0bdd0c09e527c64143e8d964629d0a73eb56ccf418c887f8149169a281252afc2e61dac9e6b14c67dc4e91c0165a371aefecb6dfc569d204a6d59e4e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    fc15deca2b866a4248b596f74cb6c57f

    SHA1

    12c415c9cfb2e7abefc0c5e3fc41b042c1533810

    SHA256

    51a94245a8fbe8b8480fbb5f5910c8cebe80e856371aa84f61270aca4ed47ec3

    SHA512

    66ba3a57c204c01337eb9de808a69113783be28e05e82ab3d2249cb42744567cbfa53ecb9b78e08fe6cedd97669a58a47463a03acf56f73db3fe0392b9cacf49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b841c07863102f946d28b67402b8e43d

    SHA1

    0068bb3872799023e8e8ad11571a8293b3877861

    SHA256

    8f66936a144b7c2a9772738dca6562a6d7a0ec114847833d437ac19b3407e2cb

    SHA512

    3b8b95ad26afabe6a42a8bcdb3dd689a49690bd944fdd6c569d3aa919c7c2421be63591709a080e4533486518b05dcf12a4028e91606761dd9478634364fabe2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d2f220ade31cd173479fd6aca2e6ffca

    SHA1

    74c1318f23d34f509f50f1cd79ff0b8c8225a54b

    SHA256

    6ff85f30af7602c9701e6fcb3260ca673fec33ab1637ac5b40f07dc9992eb86a

    SHA512

    ace34f6e801402b0c26340581b4ead41cf7b764568fc6b3bbe492344ae87ee01b9354325329ce5ed5aef74070a94b1abdb64551f05749983802ac151481262bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    5c263b21388cff4124719de22f931d77

    SHA1

    69c72605bbcc3fd6d9f51ca9b1c20e9e94a013c2

    SHA256

    80133f270aef3fcbfdc4ca377b748b1a566ad9433be78a9469b608ae551d26f3

    SHA512

    6914a0f1dcbea0454434898ca85ee341c1577529a780215a75e20bcbd5a8490df85120e81667f6f0d5d0a91f5fdf529fcca4a1faed828110b3cb111ec74daadc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f32fec2eed4642b51fc8b815ec8df5c7

    SHA1

    8bfbac2ff9223cbc63341b9f2671e1c89c4784f2

    SHA256

    59d29c6f300ccb09b9c6a5668dbb88d5a280b0726f5fcfde46deac5566c5263c

    SHA512

    a621a2adee5f6c8231f29f0747ab2ac2d57270fcacaf9d9663f4d7b837dbf1eb5247f69e8b6e34459259c523c10438bc3d0f858dfb7ddfe5346881adc423ae22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9bc62d4e1ad15a4eb702eb2bee242ea9

    SHA1

    3d5d30995cca90f7a7f52a449880f862fe69a37e

    SHA256

    42e75dab9d90885f17493162c2bdfcd2cf6544af06041f3260a91e300f6777d8

    SHA512

    95e05ff88e43daacdb1779c3c274798f576f5447438e26ce213bff281072dff2d8100113c25fbf305acc50f94efa385a73cd5411a7c5c939fa105090ea18219e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8b793c4bed6af0c92b610e749fe58e95

    SHA1

    6930a54ef3b7d1c4d97096ef0bb09dda47ba655e

    SHA256

    461737bf3a0ea18a77e8da007b4964561d850f9adb80b45775ac4f9798b18c8d

    SHA512

    c0949cbf5642a9a933f439d813869e10afb4e77a1214d7a6eb7df1a9bc953509ba6d11dcf0686b7ee65c6e3de054d3a2802edc88d9028a9873a45ec23d844565

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c16dc04eefa9fccc520047ca276e0ab1

    SHA1

    48954094361e59bcf31bb5aa29e938942c289535

    SHA256

    8c6fe13047366fd53881044905694151c48b3098975e0ca98584faae31c54eb1

    SHA512

    de01abf29e8146de8610c99ad030d3b9d20acbdf58ebd1723ca9bf9df2b5905be38b1ff1f4f9dd097dca40b368abbbab3950dfe9c29ad9bbc133ba582d215062

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    58415550da91ad8e79bcf98290fad236

    SHA1

    e16a1d21c89df9a782bb007e88b9bfa2c6eb6360

    SHA256

    f88ea0ac94e9a4b82d1fe2cf9a954965aaa490c98076a066e392a5e27e26739e

    SHA512

    551e156ff438945451d44a7fe057e53419c65a568f4de723f68424a08b287944320689fcfde76d7f7d1cb56c6d87729b77fca247de11d405a0e56fc64c04c060

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f3edf51a50dd95ca5a4494332dd0d1c0

    SHA1

    ea40ecd004a5d55665de0f0c2b2f06cab8f10986

    SHA256

    ceab169c5c4bb9c86789c6cb92c1e6e9cfc696a07a090dfff2123e5aaa80f376

    SHA512

    9c10936726b85a61bb191b0a0ac2cc3b864b149a05241eb9e0466a314bac4dd19b94d058f6adb325af89260657d44c7197e41b185b253a8b1537ef942be18561

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b08d89ae27fab7947d0bddafd9b87433

    SHA1

    58d5ec4993b1088c87fc384f6412159c492474dc

    SHA256

    763a76080c7ed440ff50e283073c7591fabcaa9f1222342dcb4520fa758c00b9

    SHA512

    2ebb3b810529653d395f07a68edb16d485111a161f9b4081808b2c725a5c05f0ac756e7e34c3a5ce4421b41168b2e6263e772d555dd879d5e3cecfe6df336ec9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8797c1cf34d69010e651b5c413b496fc

    SHA1

    abb2a8c0fd675228d8d4e369cd23d2753516218a

    SHA256

    e1f64c0a74320a7a969a6ca746ec12718c06b819290f3c04cfc5136c252b28b1

    SHA512

    11fd7fd6cf644d5be2c9fcc06b143c874b4955e0213b0c2f28a492716b73a9ec5e80a329a1a79614d4f9895a7706365b8928b211bd5aa03a1902b6dd45110628

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    ec3427a7a62c6be2473eecdaaee81259

    SHA1

    523e35d06fd6dcb4ece574a6cb849dc6029e67a1

    SHA256

    23dacbd2eb1a573f47fdca781b23c0691a97c417a092358a91f74f13485b2a75

    SHA512

    257d6bd856199f6400aeb58fea02508c1b00fafc8b75a1b5b372be14c942127604fbbacb3fca8e2d08ef9cea1358a89aa33a5409ea32ed7887b2e988f2da6348

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    903f90c5f4c80ef2b3e4a73ab4732116

    SHA1

    1cb3df14c95df2c5ccb5d8ec9026a5575d39be62

    SHA256

    7557041afbcef3e6a3e2ffe7356f2fa5f7cb030176410a27cbe2010a279cfcbd

    SHA512

    113871c06da63fc312ae44e25587b1f179605b6f5748d6aeb178f586d53c9a0ab276b540eecc7d4f1af8ef5df582eedc5be7a7ca5c254bf734f29996491d9f43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    4a051348c30aae144f746de8a9562de5

    SHA1

    1cb0e625762e111ffab81e3e4339454c12db470a

    SHA256

    012d503a220232b01e90fb6657badb290ba12598c5351a8386980fb6a649933d

    SHA512

    fd320e7ea759a8aac3e66f8b18b744bef1948a1b9d7228479f5f8e12cfc5937b5a974ffdb061512500831bcb876fd9b8e0b594a190a131ab449b685e75eff4d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3f657b05c0500a59c267f8b3ee85bd17

    SHA1

    aa98cb23d37fe483c61e693344a429a197e15a33

    SHA256

    0010775c937e6798071398bf2e8458441b8e5a530a48ed44ee3f8c35f15b55c3

    SHA512

    f2c1c7c77e1c0a033e4422ea5ea79ae883335480638530c56ebc8d6e75430a31a4946a1c2ddb68556dea01475b50ef64ea45b7c752be9609cab40e390d0633ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    82d74fc380f0794f17e4340b846b4a01

    SHA1

    9cb49767fdd270924b3bb0fda83b97853f83ec0b

    SHA256

    3412162853c23f4e17cb1d93dfced3750d1201684ad00229f524efe910ba5da2

    SHA512

    ec27539c99b8b54934e505c21b531dea31e73c3cc91ac79335088476276c3bc056be8b50e591338ff5e08839ad246d198eaf6d7e26dbfb64efd439db9f12aa95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    e0939bd662aa25542ab9b3db51eb25be

    SHA1

    f284c31fd621cd3bac317bfa5b9fb19c1df58b34

    SHA256

    5d08672a0b8ae751b6af8452b057a6439f9bfaa8aaae21d2985bda3755a35e3e

    SHA512

    c6a19260328cbccef0a199b993e53ff4aa73dcd61022cf8768d9be8481f26856e70236a523e83c2a8444e647dd4c4e061ca1c47fd910c391d5ebf87e7bdf3e82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    71b9364faf7ef93e381b86731c094c5e

    SHA1

    62d5b4d62218be221292884a12df1fe6e6d9d8e1

    SHA256

    de369835d19a73b4b72c5992f3e04a0c96f26bdc2a921cbbbd9c8056395265fc

    SHA512

    ec07d6495e45bf8973da9fc9bd70aec4553c8cd934f84d734bc8101b245e30b6626fdffd1ba57427dbe23a6f36502a5ccd09dfc6df750b774b1cd6b70dbb6bd3

  • C:\Users\Admin\AppData\Local\Temp\Cab5736.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Echelon.exe.config
    Filesize

    216B

    MD5

    ed6192054a346a72d8bd4352895f25f9

    SHA1

    2de8e2859eb7451eb23d408cf9fa45f37a4e2d0e

    SHA256

    707f233f9e814e64d7655a78275e60bb44c35646292fa5b41ee936e1763c9f77

    SHA512

    7fe3851b67da2cd748c5e194e7b0c8252c65516ac710d950e5d6ac3aefe7051a5a01e034d6714f1dba077046ec211d234eb9f19e05c80d292b24e0f84dd6ce0f

  • C:\Users\Admin\AppData\Local\Temp\Tar57A7.tmp
    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Echelon.exe
    Filesize

    592KB

    MD5

    52c389a5c951fa6b0c5636ece3b9a4cc

    SHA1

    7ea98e6dc3113e1bb7a89a4b8c3f29f770163b68

    SHA256

    8b7240910326218e895b469398b4e98443ba8aba78e17270659050fb7562f930

    SHA512

    6bdbd1dfd21f7db0682972502e632fa006843db79c46265e8199c75f69458ecf6506c3c5b8424d465d004483897056739e2edb73b821205b48a0d7fb6b48f38d