Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/01/2024, 13:06

General

  • Target

    EpsilonSetup.exe

  • Size

    147.0MB

  • MD5

    71cbb2a62b34a12c30b9c1c26b0e52a4

  • SHA1

    d749dab0b72d81f1ef74a99bf8d7d3553b507057

  • SHA256

    cf43804749edd21997f8bc987a0b90188a43bcd5b561572593f09d2647918a43

  • SHA512

    8a3e14c4f49251cf6c755514c5aca567fa85ed622766d258a6799ae0c7326b69968db8e9d512b0f605c5a141b61dc84e7d68a3f56204961c232be11b76b19b22

  • SSDEEP

    1572864:groLm1cZ4K5MvHwpkeg9duXYFPEiFWITK886rc028B+yJwG5xmR:VCjwAI8xO

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates processes with tasklist 1 TTPs 16 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EpsilonSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\EpsilonSetup.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3320
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:1756
    • C:\Users\Admin\AppData\Local\Temp\EpsilonSetup.exe
      "C:\Users\Admin\AppData\Local\Temp\EpsilonSetup.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\project" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1556 --field-trial-handle=1752,i,14929015352515415817,13888800670055878610,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:3856
      • C:\Users\Admin\AppData\Local\Temp\EpsilonSetup.exe
        "C:\Users\Admin\AppData\Local\Temp\EpsilonSetup.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\project" --mojo-platform-channel-handle=1996 --field-trial-handle=1752,i,14929015352515415817,13888800670055878610,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
        2⤵
          PID:3384
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "tasklist"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3672
          • C:\Windows\system32\tasklist.exe
            tasklist
            3⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:3900
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "tasklist"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1776
          • C:\Windows\system32\tasklist.exe
            tasklist
            3⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2812
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "tasklist"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4972
          • C:\Windows\system32\tasklist.exe
            tasklist
            3⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:4940
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "tasklist"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2344
          • C:\Windows\system32\tasklist.exe
            tasklist
            3⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:3928
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "tasklist"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2592
          • C:\Windows\system32\tasklist.exe
            tasklist
            3⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:404
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "tasklist"
          2⤵
            PID:1456
            • C:\Windows\system32\tasklist.exe
              tasklist
              3⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:2116
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "tasklist"
            2⤵
              PID:4384
              • C:\Windows\system32\tasklist.exe
                tasklist
                3⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:4848
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "tasklist"
              2⤵
                PID:5004
                • C:\Windows\system32\tasklist.exe
                  tasklist
                  3⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1756
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                2⤵
                  PID:4144
                  • C:\Windows\system32\tasklist.exe
                    tasklist
                    3⤵
                    • Enumerates processes with tasklist
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4752
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                  2⤵
                    PID:5032
                    • C:\Windows\system32\tasklist.exe
                      tasklist
                      3⤵
                      • Enumerates processes with tasklist
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1776
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                    2⤵
                      PID:3000
                      • C:\Windows\system32\tasklist.exe
                        tasklist
                        3⤵
                        • Enumerates processes with tasklist
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3348
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                      2⤵
                        PID:2600
                        • C:\Windows\system32\tasklist.exe
                          tasklist
                          3⤵
                          • Enumerates processes with tasklist
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3536
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                        2⤵
                          PID:1788
                          • C:\Windows\system32\tasklist.exe
                            tasklist
                            3⤵
                            • Enumerates processes with tasklist
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2164
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                          2⤵
                            PID:4224
                            • C:\Windows\system32\tasklist.exe
                              tasklist
                              3⤵
                              • Enumerates processes with tasklist
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3512
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /d /s /c "tasklist"
                            2⤵
                              PID:3952
                              • C:\Windows\system32\tasklist.exe
                                tasklist
                                3⤵
                                • Enumerates processes with tasklist
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2460
                            • C:\Users\Admin\AppData\Local\Temp\EpsilonSetup.exe
                              "C:\Users\Admin\AppData\Local\Temp\EpsilonSetup.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\project" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=936 --field-trial-handle=1752,i,14929015352515415817,13888800670055878610,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4976

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\305e1cd1-9fae-4c50-b438-3aadbdde292c.tmp.node

                            Filesize

                            135KB

                            MD5

                            0b5b5c8b7a7d8229480d5daa5ecca1be

                            SHA1

                            c1bc3a25f374e3609d0782f2cb9dd340a73c5f84

                            SHA256

                            e59e21b84b2a6200c3789157d5f14407ea4dfe880bb2113666d10e98ceb3ee8f

                            SHA512

                            7924bc9ce70f37d3ea4ab2cbd2d94e53d9f77db42a8cc868a1bd0d3cca235fece5f46ea091fe96839fd6a5e63e9473d9d0d5c2d2e0ef1545757dfae792b6e1a6

                          • C:\Users\Admin\AppData\Local\Temp\f852f2c4-13e2-485b-9dc4-d40aea8f03e4.tmp.node

                            Filesize

                            1.8MB

                            MD5

                            beb8d911d40e8fe94770d9d341e0de11

                            SHA1

                            d24d31e5b44a4a80969e2a669fb9b0ed42cfd479

                            SHA256

                            ec41fc2fee2abcbf0559965501f54aae47cff24a87204fd3a85d86c7d53d53c7

                            SHA512

                            079c43c2533fa35411247dd091c5caedb4a0dbdeee7b8f9fbbba6f521d760856822d373f1e6682eff10bebc63168cb4a445aee7b23047e4d784ab28891d07bfe

                          • memory/3856-10-0x00007FFEB5580000-0x00007FFEB5581000-memory.dmp

                            Filesize

                            4KB

                          • memory/4976-57-0x00000225D8CD0000-0x00000225D8CD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4976-47-0x00000225D8CD0000-0x00000225D8CD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4976-58-0x00000225D8CD0000-0x00000225D8CD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4976-48-0x00000225D8CD0000-0x00000225D8CD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4976-56-0x00000225D8CD0000-0x00000225D8CD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4976-55-0x00000225D8CD0000-0x00000225D8CD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4976-54-0x00000225D8CD0000-0x00000225D8CD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4976-53-0x00000225D8CD0000-0x00000225D8CD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4976-52-0x00000225D8CD0000-0x00000225D8CD1000-memory.dmp

                            Filesize

                            4KB

                          • memory/4976-46-0x00000225D8CD0000-0x00000225D8CD1000-memory.dmp

                            Filesize

                            4KB