Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2024 03:02

General

  • Target

    e09b3349afedd9bc6713f0640dac5a73.exe

  • Size

    3.7MB

  • MD5

    e09b3349afedd9bc6713f0640dac5a73

  • SHA1

    2bed69865fce75b42da5f53b02d74eaba01f7819

  • SHA256

    f8cad8601b4d97cbe6befe13fce900eaa01063283a91ffae28038c9370f7b582

  • SHA512

    48ed49531d29f503f1c8f25ab278de851560576aca96baa521b0c1b1b6b2887ba6c6d71cbed0049faaeb1c4c8b531b186f7eba5cd141ae1ececafc3aa280a213

  • SSDEEP

    98304:VG0WE8JkdS9cHaXMsbNWhYq3bdckunUnU63:fvNIc6XyYq3bHtX

Malware Config

Signatures

  • Darkstealer

    Darkstealer is a file grabber, data stealer, and RAT.

  • Detects Echelon Stealer payload 3 IoCs
  • Echelon

    Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

  • Echelon - DarkStealer Fork 3 IoCs

    Payload resembles modified variant of Echelon Stealer called DarkStealer.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e09b3349afedd9bc6713f0640dac5a73.exe
    "C:\Users\Admin\AppData\Local\Temp\e09b3349afedd9bc6713f0640dac5a73.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Accesses Microsoft Outlook profiles
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • outlook_office_path
    • outlook_win_path
    PID:764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\FVuBPR078BFBFF000306D29824364634\34078BFBFF000306D298243646FVuBPR\Browsers\Passwords\Passwords_Edge.txt

    Filesize

    52B

    MD5

    fdec4452a98b7d7f3dc83904cd82a724

    SHA1

    2b447ea859993ab549ee1547c72071e59cace07c

    SHA256

    59b16ba683aaf821362d2061fef52b52a909ad63be1192ef3d2374f3e8a4b235

    SHA512

    87a573d8a9a085ffeea49335d213f96cd55385a3afa281d1a4a321043e82cd81a324d1131c764d024966d9dcbcc219d78514b0cdce74f849fe33e0f9ce2df432

  • memory/764-16-0x0000000075D90000-0x0000000075EA0000-memory.dmp

    Filesize

    1.1MB

  • memory/764-86-0x0000000075C20000-0x0000000075C67000-memory.dmp

    Filesize

    284KB

  • memory/764-7-0x0000000075D90000-0x0000000075EA0000-memory.dmp

    Filesize

    1.1MB

  • memory/764-9-0x0000000075D90000-0x0000000075EA0000-memory.dmp

    Filesize

    1.1MB

  • memory/764-10-0x0000000075D90000-0x0000000075EA0000-memory.dmp

    Filesize

    1.1MB

  • memory/764-11-0x0000000075D90000-0x0000000075EA0000-memory.dmp

    Filesize

    1.1MB

  • memory/764-13-0x0000000075D90000-0x0000000075EA0000-memory.dmp

    Filesize

    1.1MB

  • memory/764-14-0x0000000075D90000-0x0000000075EA0000-memory.dmp

    Filesize

    1.1MB

  • memory/764-15-0x0000000075D90000-0x0000000075EA0000-memory.dmp

    Filesize

    1.1MB

  • memory/764-17-0x0000000077D40000-0x0000000077D42000-memory.dmp

    Filesize

    8KB

  • memory/764-87-0x0000000074D50000-0x000000007543E000-memory.dmp

    Filesize

    6.9MB

  • memory/764-6-0x0000000075D90000-0x0000000075EA0000-memory.dmp

    Filesize

    1.1MB

  • memory/764-5-0x0000000075C20000-0x0000000075C67000-memory.dmp

    Filesize

    284KB

  • memory/764-8-0x0000000075D90000-0x0000000075EA0000-memory.dmp

    Filesize

    1.1MB

  • memory/764-12-0x0000000075C20000-0x0000000075C67000-memory.dmp

    Filesize

    284KB

  • memory/764-19-0x0000000074D50000-0x000000007543E000-memory.dmp

    Filesize

    6.9MB

  • memory/764-20-0x0000000000B00000-0x000000000149E000-memory.dmp

    Filesize

    9.6MB

  • memory/764-21-0x0000000000B00000-0x000000000149E000-memory.dmp

    Filesize

    9.6MB

  • memory/764-51-0x0000000005660000-0x00000000056A0000-memory.dmp

    Filesize

    256KB

  • memory/764-1-0x0000000075D90000-0x0000000075EA0000-memory.dmp

    Filesize

    1.1MB

  • memory/764-84-0x0000000000B00000-0x000000000149E000-memory.dmp

    Filesize

    9.6MB

  • memory/764-0-0x0000000000B00000-0x000000000149E000-memory.dmp

    Filesize

    9.6MB

  • memory/764-85-0x0000000075D90000-0x0000000075EA0000-memory.dmp

    Filesize

    1.1MB

  • memory/764-18-0x0000000075D90000-0x0000000075EA0000-memory.dmp

    Filesize

    1.1MB