Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-02-2024 06:51
Static task
static1
Behavioral task
behavioral1
Sample
adf2c1710358901e7cc4131c8705ff1b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
adf2c1710358901e7cc4131c8705ff1b.exe
Resource
win10v2004-20240226-en
General
-
Target
adf2c1710358901e7cc4131c8705ff1b.exe
-
Size
3.1MB
-
MD5
adf2c1710358901e7cc4131c8705ff1b
-
SHA1
f7422460048a1bb7df79c40df103c2ea160d51f6
-
SHA256
fe84372f838e5c4ab673dcf10349c94433399d725c9586a2aa2a077f168c2020
-
SHA512
6a966025634645e85a0ade32858510d2e2c29dc5a86e584a3da737aaf27937789deb6855992f23d5f54e43f3a8124b6d74ac65c202babe4e0a4038fafe71fb01
-
SSDEEP
98304:TVrCEpy5HS84pl5NlSHtaJd3Bo5iIenLkQvFvk:TVrXy5Hzo5NkHted3kiIeLfFM
Malware Config
Signatures
-
Detects Echelon Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2968-9-0x0000000000DB0000-0x0000000001380000-memory.dmp family_echelon behavioral1/memory/2968-10-0x0000000000DB0000-0x0000000001380000-memory.dmp family_echelon -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
adf2c1710358901e7cc4131c8705ff1b.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ adf2c1710358901e7cc4131c8705ff1b.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
adf2c1710358901e7cc4131c8705ff1b.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion adf2c1710358901e7cc4131c8705ff1b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion adf2c1710358901e7cc4131c8705ff1b.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
adf2c1710358901e7cc4131c8705ff1b.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Wine adf2c1710358901e7cc4131c8705ff1b.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
adf2c1710358901e7cc4131c8705ff1b.exepid Process 2968 adf2c1710358901e7cc4131c8705ff1b.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2492 2968 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
adf2c1710358901e7cc4131c8705ff1b.exepid Process 2968 adf2c1710358901e7cc4131c8705ff1b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
adf2c1710358901e7cc4131c8705ff1b.exedescription pid Process Token: SeDebugPrivilege 2968 adf2c1710358901e7cc4131c8705ff1b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
adf2c1710358901e7cc4131c8705ff1b.exedescription pid Process procid_target PID 2968 wrote to memory of 2492 2968 adf2c1710358901e7cc4131c8705ff1b.exe 29 PID 2968 wrote to memory of 2492 2968 adf2c1710358901e7cc4131c8705ff1b.exe 29 PID 2968 wrote to memory of 2492 2968 adf2c1710358901e7cc4131c8705ff1b.exe 29 PID 2968 wrote to memory of 2492 2968 adf2c1710358901e7cc4131c8705ff1b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\adf2c1710358901e7cc4131c8705ff1b.exe"C:\Users\Admin\AppData\Local\Temp\adf2c1710358901e7cc4131c8705ff1b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 13722⤵
- Program crash
PID:2492
-