Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 18:15
Behavioral task
behavioral1
Sample
d6ca1276e7b7d3cb2b80c923344d224c.exe
Resource
win7-20240221-en
General
-
Target
d6ca1276e7b7d3cb2b80c923344d224c.exe
-
Size
1.0MB
-
MD5
d6ca1276e7b7d3cb2b80c923344d224c
-
SHA1
aba6992aff5b194d04b003bfeeca7bb4ff7c94e3
-
SHA256
c3a19079975435934b29b6240b39aea2c5695657cbec4d5e27d862edf1c61c7a
-
SHA512
727ef205904c12df9b4b85323f54913f07fde65f4cd715ecdb6345ba65fd6be0b0b95e89759036f9a0c90ba4c17616c25707996f0aed93d57970c84b240056e5
-
SSDEEP
24576:tjE5uYGhhUF54clNf7+6uHAW92zt/sWu2BSMCqDoRyE:1o54clgLH+tkWJ0N9
Malware Config
Signatures
-
Detects Echelon Stealer payload 1 IoCs
resource yara_rule behavioral2/memory/4256-0-0x0000000000170000-0x0000000000276000-memory.dmp family_echelon -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org 7 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4256 d6ca1276e7b7d3cb2b80c923344d224c.exe 4256 d6ca1276e7b7d3cb2b80c923344d224c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4256 d6ca1276e7b7d3cb2b80c923344d224c.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ZRVwVuZZZH078BFBFF000306D266EA2EA947\47078BFBFF000306D266EA2EA9ZRVwVuZZZH\Browsers\Passwords\Passwords_Edge.txt
Filesize426B
MD542fa959509b3ed7c94c0cf3728b03f6d
SHA1661292176640beb0b38dc9e7a462518eb592d27d
SHA256870ef3d2370932a8938faa60abd47d75ea0af98bfa11c82ae8efe9e94fd8be00
SHA5127def291737d081c93d0cc38ac8d3062fd34d93b68d191eb0d54e9857e0c0afdbcd241471a2e10c28ce8db3b1d1ae0dba2ef6f609cfe8a1e8fe1dd103dba80007
-
C:\Users\Admin\AppData\Local\Temp\ZRVwVuZZZH078BFBFF000306D266EA2EA947\47078BFBFF000306D266EA2EA9ZRVwVuZZZH\Grabber\OptimizeMeasure.png
Filesize1.2MB
MD59ac0b1667701a0a15f6d5b5997c99418
SHA1c941af4b201a9e22f3388e3ac535a24f952a8297
SHA2565d7d313d9077785ba840847ce86954057dba848a0864ab76771a690124dea4fd
SHA51210fb62ce98f4ccd65c694111ff2eeb3adb1eddd500b00ba2a2f6cdb3fd3a3edb3bd9d57ce1578efeabb8f70fc36ab9094767d1fdf7aff27b828a14d5d40fadd4
-
C:\Users\Admin\AppData\Local\Temp\ZRVwVuZZZH078BFBFF000306D266EA2EA947\47078BFBFF000306D266EA2EA9ZRVwVuZZZH\Grabber\SyncBackup.jpg
Filesize609KB
MD584f66137c8936023361719b8fd430c5e
SHA16f1d46f35e345d872ae75ec15389562884472b89
SHA256a334d989577ee35473cae020cbbbc348bf79bc6861704246435dd697daf32556
SHA5123eb7b2c0c8edf2a84f6d84afca2041a5f5f36ff154709f7ca9512c3c0c6542f96518511cbfe1739a62f5560c9838e7e91f8680334e74c7737161949e5e9a9583
-
C:\Users\Admin\AppData\Local\Temp\ZRVwVuZZZH078BFBFF000306D266EA2EA947\47078BFBFF000306D266EA2EA9ZRVwVuZZZH\Grabber\TraceCopy.txt
Filesize420KB
MD50a8a0be04e226e30275a6449dbcd6077
SHA1d13a559ceeacc9ed442f4bbf7bc025edc90ceed9
SHA25641ef8f41a526be3d1c307f555d1ab9d29423536d4ddf44eac6cb2ddef3599894
SHA5127b5af3d129868c71974893ed1f84da4a010471183e2b0436162b870484b6c9689dde910694e896804717e076b128447c840c5c3e574aae23342f68d613f78260
-
C:\Users\Admin\AppData\Local\Temp\ZRVwVuZZZH078BFBFF000306D266EA2EA947\47078BFBFF000306D266EA2EA9ZRVwVuZZZH\Grabber\UnblockConfirm.cfg
Filesize528KB
MD5e3562fe85dcbcbbb8d4accf19e95c7a4
SHA1452d0075e03ba14790827520b21b7d72e627c92f
SHA256743b345dbba72450491de2268487a6ab683eb1215437ac6b8dfa7ce3dd4d2f15
SHA5127726bee7bc0f75c994ee8bdd2f57ff8771653667a682815eb9ab7d2f9db3ebb70672637b77567b834099ccb3899438d7a04069e8b3d9e5405f4987d8fe189b10
-
C:\Users\Admin\AppData\Local\Temp\ZRVwVuZZZH078BFBFF000306D266EA2EA947\47078BFBFF000306D266EA2EA9ZRVwVuZZZH\Grabber\UninstallOptimize.txt
Filesize626KB
MD53c9ca95aed2a18c4ca454b59da376013
SHA1ddd0225655bb91832b417f408de89a2f608f68a7
SHA256d6dffc590ac2242114441db1b5b415889f1b085f14719a296c342fdf92f87b67
SHA5120935f7f978341ebe8d32ebc450c1fe3f67859d6b060c0294676a327d44cecb8f04ecbfe4401e6242630da818ab314bd50849df836a1aee2dee458b59984e7f70