Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2024 01:01
Behavioral task
behavioral1
Sample
b718f84209afe709bfd350af778f18cb85e04b3628df68bd5d2809111fda6ced.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
b718f84209afe709bfd350af778f18cb85e04b3628df68bd5d2809111fda6ced.exe
-
Size
659KB
-
MD5
e295f747bef8b081ab1855e3c704d033
-
SHA1
0de24fbfa8507a9cff1df85c080cb573478b3eaf
-
SHA256
b718f84209afe709bfd350af778f18cb85e04b3628df68bd5d2809111fda6ced
-
SHA512
f6234cc03b9f068907243172518b85b2f55a298548a6f0ad3ba2af9adcccf9f640152d2b998f08fadfb12551c37eef94c2a29fc48e405cbf2d954a56d88cd67a
-
SSDEEP
12288:DA03baVDTvXEhaQL32ikCaUS4csRBse6sfWHAA:DA03baVDTvkay3k94cunZeHB
Malware Config
Signatures
-
Detects Echelon Stealer payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5096-0-0x000001D8405B0000-0x000001D84065C000-memory.dmp family_echelon -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org 4 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b718f84209afe709bfd350af778f18cb85e04b3628df68bd5d2809111fda6ced.exedescription pid Process Token: SeDebugPrivilege 5096 b718f84209afe709bfd350af778f18cb85e04b3628df68bd5d2809111fda6ced.exe