Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2024 01:09
Behavioral task
behavioral1
Sample
1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exe
Resource
win10v2004-20231215-en
General
-
Target
1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exe
-
Size
656KB
-
MD5
e5c4dfc2eec2701e29fd4fbd9eeeaa74
-
SHA1
229d7c107ba39d420ee2fcce7ed1dc9c268bd82b
-
SHA256
1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc
-
SHA512
ddf5e9417c5ac4c266a31ff272ceca596dc21b06258c21953e77c56135d726b3005b1ae14ef03472795335194360f7733d70bf24be8d2b4e2de1aa3ee09e724d
-
SSDEEP
6144:0jsXsq2XgCnQ48gSO/+uCInHLhJI4FY/ixjci6ychf8xalGQGtSV41kJDsTDDpBu:0soLnpIQL32ikCaUS4csRBse6sfW/AA
Malware Config
Signatures
-
Detects Echelon Stealer payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1040-0-0x000002D44B620000-0x000002D44B6CA000-memory.dmp family_echelon -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exe Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exe Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 api.ipify.org 32 ip-api.com 6 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exepid process 1040 1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exe 1040 1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exedescription pid process Token: SeDebugPrivilege 1040 1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exe -
outlook_office_path 1 IoCs
Processes:
1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exe -
outlook_win_path 1 IoCs
Processes:
1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exe"C:\Users\Admin\AppData\Local\Temp\1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exe"1⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1040