Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 06:51
Static task
static1
Behavioral task
behavioral1
Sample
adf2c1710358901e7cc4131c8705ff1b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
adf2c1710358901e7cc4131c8705ff1b.exe
Resource
win10v2004-20240226-en
General
-
Target
adf2c1710358901e7cc4131c8705ff1b.exe
-
Size
3.1MB
-
MD5
adf2c1710358901e7cc4131c8705ff1b
-
SHA1
f7422460048a1bb7df79c40df103c2ea160d51f6
-
SHA256
fe84372f838e5c4ab673dcf10349c94433399d725c9586a2aa2a077f168c2020
-
SHA512
6a966025634645e85a0ade32858510d2e2c29dc5a86e584a3da737aaf27937789deb6855992f23d5f54e43f3a8124b6d74ac65c202babe4e0a4038fafe71fb01
-
SSDEEP
98304:TVrCEpy5HS84pl5NlSHtaJd3Bo5iIenLkQvFvk:TVrXy5Hzo5NkHted3kiIeLfFM
Malware Config
Signatures
-
Detects Echelon Stealer payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1888-3-0x0000000000A40000-0x0000000001010000-memory.dmp family_echelon behavioral2/memory/1888-5-0x0000000000A40000-0x0000000001010000-memory.dmp family_echelon behavioral2/memory/1888-42-0x0000000000A40000-0x0000000001010000-memory.dmp family_echelon -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
adf2c1710358901e7cc4131c8705ff1b.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ adf2c1710358901e7cc4131c8705ff1b.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
adf2c1710358901e7cc4131c8705ff1b.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion adf2c1710358901e7cc4131c8705ff1b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion adf2c1710358901e7cc4131c8705ff1b.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
adf2c1710358901e7cc4131c8705ff1b.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Wine adf2c1710358901e7cc4131c8705ff1b.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
adf2c1710358901e7cc4131c8705ff1b.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 adf2c1710358901e7cc4131c8705ff1b.exe Key opened \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 adf2c1710358901e7cc4131c8705ff1b.exe Key opened \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 adf2c1710358901e7cc4131c8705ff1b.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
adf2c1710358901e7cc4131c8705ff1b.exepid Process 1888 adf2c1710358901e7cc4131c8705ff1b.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4708 1888 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
adf2c1710358901e7cc4131c8705ff1b.exepid Process 1888 adf2c1710358901e7cc4131c8705ff1b.exe 1888 adf2c1710358901e7cc4131c8705ff1b.exe 1888 adf2c1710358901e7cc4131c8705ff1b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
adf2c1710358901e7cc4131c8705ff1b.exedescription pid Process Token: SeDebugPrivilege 1888 adf2c1710358901e7cc4131c8705ff1b.exe -
outlook_office_path 1 IoCs
Processes:
adf2c1710358901e7cc4131c8705ff1b.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 adf2c1710358901e7cc4131c8705ff1b.exe -
outlook_win_path 1 IoCs
Processes:
adf2c1710358901e7cc4131c8705ff1b.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 adf2c1710358901e7cc4131c8705ff1b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\adf2c1710358901e7cc4131c8705ff1b.exe"C:\Users\Admin\AppData\Local\Temp\adf2c1710358901e7cc4131c8705ff1b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Accesses Microsoft Outlook profiles
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 25682⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1888 -ip 18881⤵PID:4756