Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 18:45
Static task
static1
Behavioral task
behavioral1
Sample
a27ba5e68cdd7333b8cd5e4ebd558019.exe
Resource
win7-20240221-en
General
-
Target
a27ba5e68cdd7333b8cd5e4ebd558019.exe
-
Size
863KB
-
MD5
a27ba5e68cdd7333b8cd5e4ebd558019
-
SHA1
c4e6d99f3979003424ad4cc511a36434944c02b0
-
SHA256
e42ba94ba2b856fdb7aa01b9dee11abd71c55b6fc15e1933a77269deedb57e88
-
SHA512
2edfb1bae88e3088da81fbcf382fa7955998562817eb9f25bfaef6d82cbeb064c93764d1f9f127ad667543854109da6df84938cbb8d9b62eabf3a00ee5699ff1
-
SSDEEP
12288:XZaaNwVY4K/EX7xzHMPq/2KAIoE2F27HFqkPNXyDxR8AVNHp+0ng13k/u:Ja3VDHtsz5hoHM4KxR8Mg
Malware Config
Signatures
-
Detects Echelon Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x000b000000012251-3.dat family_echelon behavioral1/memory/2980-15-0x0000000000C10000-0x0000000000D16000-memory.dmp family_echelon -
Executes dropped EXE 2 IoCs
Processes:
CoderVir Stealer Love Lolz.guru.exe98899.exepid Process 2980 CoderVir Stealer Love Lolz.guru.exe 2572 98899.exe -
Loads dropped DLL 7 IoCs
Processes:
a27ba5e68cdd7333b8cd5e4ebd558019.exeWerFault.exepid Process 2192 a27ba5e68cdd7333b8cd5e4ebd558019.exe 2192 a27ba5e68cdd7333b8cd5e4ebd558019.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe 2496 WerFault.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org 2 wtfismyip.com 3 wtfismyip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2496 2572 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
98899.exepid Process 2572 98899.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
98899.exeCoderVir Stealer Love Lolz.guru.exedescription pid Process Token: SeDebugPrivilege 2572 98899.exe Token: SeDebugPrivilege 2980 CoderVir Stealer Love Lolz.guru.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a27ba5e68cdd7333b8cd5e4ebd558019.exe98899.exedescription pid Process procid_target PID 2192 wrote to memory of 2980 2192 a27ba5e68cdd7333b8cd5e4ebd558019.exe 28 PID 2192 wrote to memory of 2980 2192 a27ba5e68cdd7333b8cd5e4ebd558019.exe 28 PID 2192 wrote to memory of 2980 2192 a27ba5e68cdd7333b8cd5e4ebd558019.exe 28 PID 2192 wrote to memory of 2980 2192 a27ba5e68cdd7333b8cd5e4ebd558019.exe 28 PID 2192 wrote to memory of 2572 2192 a27ba5e68cdd7333b8cd5e4ebd558019.exe 29 PID 2192 wrote to memory of 2572 2192 a27ba5e68cdd7333b8cd5e4ebd558019.exe 29 PID 2192 wrote to memory of 2572 2192 a27ba5e68cdd7333b8cd5e4ebd558019.exe 29 PID 2192 wrote to memory of 2572 2192 a27ba5e68cdd7333b8cd5e4ebd558019.exe 29 PID 2572 wrote to memory of 2496 2572 98899.exe 31 PID 2572 wrote to memory of 2496 2572 98899.exe 31 PID 2572 wrote to memory of 2496 2572 98899.exe 31 PID 2572 wrote to memory of 2496 2572 98899.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a27ba5e68cdd7333b8cd5e4ebd558019.exe"C:\Users\Admin\AppData\Local\Temp\a27ba5e68cdd7333b8cd5e4ebd558019.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe"C:\Users\Admin\AppData\Local\Temp\CoderVir Stealer Love Lolz.guru.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\98899.exe"C:\Users\Admin\AppData\Local\Temp\98899.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 11523⤵
- Loads dropped DLL
- Program crash
PID:2496
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5ac0a9390d50cbc5133523482b31e0735
SHA14d29f350e46df5672f87095033cdfe3710c58b42
SHA256710dec8e4d9f735cab190d54b4b27b23636d98d588b93ddbc112a48427eaa18c
SHA512a5fd9ec8f7b60a63865b1cf85daf76247c677c7a1de0165449680f7640be2d48ff90dd97639c644e013b4c2e429240e0b52804334b49b3ac7903c6d7fd4e8f64
-
Filesize
1.0MB
MD5c10aa673e83a05634292512446b5896d
SHA18ac8a1820c0f907412b8159476348ed690cfbaee
SHA2566040eb35031a150e4ba05d2e808c5d800a051a537ce4b6c68f3f9b0da9a7258e
SHA5122a0bd1ccae71a802ffcfa79a2c15ed54a7c932b63905f8cbd320f8e90af729294e8812ead8bba7853bc5527afba00fdf77d353ad857187a32efb0cfc854a4d67