Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240319-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-03-2024 01:22

General

  • Target

    3bc1d00f0674053b830c8f7dd0524c7cc9e9bc903d8b8ed68ada0a0bfcea8f74.exe

  • Size

    1.5MB

  • MD5

    b48e703173ef1528c021f5378342fed3

  • SHA1

    86c4f91ced9e9090ef17e0a2c1c1f494ddd61e93

  • SHA256

    3bc1d00f0674053b830c8f7dd0524c7cc9e9bc903d8b8ed68ada0a0bfcea8f74

  • SHA512

    ab6932abcc92ae8b9404fe54e421c28f59820eba63054ea10ab81c49db739f79a82237f77dfe8527727ba2e30fa12af8bcfc99f23891a3988a73386d46361075

  • SSDEEP

    24576:PFOa+nsJ39LyjbJkQFMhmC+6GD9iS0NYTuothhUF54clNf7zBl:tSnsHyjtk2MYC5GDgIo54cl9z

Malware Config

Signatures

  • Detects Echelon Stealer payload 7 IoCs
  • Echelon

    Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bc1d00f0674053b830c8f7dd0524c7cc9e9bc903d8b8ed68ada0a0bfcea8f74.exe
    "C:\Users\Admin\AppData\Local\Temp\3bc1d00f0674053b830c8f7dd0524c7cc9e9bc903d8b8ed68ada0a0bfcea8f74.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4984
    • \??\c:\users\admin\appdata\local\temp\3bc1d00f0674053b830c8f7dd0524c7cc9e9bc903d8b8ed68ada0a0bfcea8f74.exe 
      c:\users\admin\appdata\local\temp\3bc1d00f0674053b830c8f7dd0524c7cc9e9bc903d8b8ed68ada0a0bfcea8f74.exe 
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4364
        • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2604
          • C:\ProgramData\Decoder.exe
            "C:\ProgramData\Decoder.exe"
            5⤵
            • Checks computer location settings
            • Drops startup file
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2192
            • C:\Windows\System32\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /tn "Windows Services" /tr "\systems32_bit\systems32.exe" /f
              6⤵
              • Creates scheduled task(s)
              PID:1912
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\.cmd""
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1532
            • C:\Windows\system32\timeout.exe
              timeout 4
              6⤵
              • Delays execution with timeout.exe
              PID:908
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8B19.tmp.cmd""
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3912
            • C:\Windows\system32\timeout.exe
              timeout 4
              6⤵
              • Delays execution with timeout.exe
              PID:5032
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4760
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4136
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1772
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:5072
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:4596
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=752 --field-trial-handle=2808,i,4621512294509789388,1545966267740426092,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:109336
    • C:\systems32_bit\systems32.exe
      \systems32_bit\systems32.exe
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:117064
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /tn "Windows Services" /tr "\systems32_bit\systems32.exe" /f
        2⤵
        • Creates scheduled task(s)
        PID:118020

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Decoder.exe

      Filesize

      39KB

      MD5

      e753a9a4c3a393d9eccc31e5c6aded66

      SHA1

      5501ae71598925711dbee54f6ee1c827dd01d845

      SHA256

      52773fccbe6883ca7465ffe857c3fe7193521f0807bd8462f95bd4ad73be9867

      SHA512

      ee03d79cd24db07c3466cc602a657c9eb33119267b591a64a0d9215e3a80a24e3c435275ccfb5ffd7356def5bf717c5f2d8bc9a5b2daf1950ecf951b5e614c2e

    • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

      Filesize

      631KB

      MD5

      2ecf15082145d0711dba34265ee7a4ce

      SHA1

      4396b4e15867db2f4bd3c2b307840184f893cf17

      SHA256

      a93ff2073d5d3147c9c2e58fb5b5dabc156fdff20c626d2585932fc511703468

      SHA512

      c412503982b989b6bce81b90e1fc839e5601fab1268e768eb812ae34118e1c48cf79359054ba2cb60da676d99f2efdf1c9549a203ea234c7388712928c7562d2

    • C:\Users\Admin\AppData\Local\Temp\.cmd

      Filesize

      28B

      MD5

      217407484aac2673214337def8886072

      SHA1

      0f8c4c94064ce1f7538c43987feb5bb2d7fec0c6

      SHA256

      467c28ed423f513128575b1c8c6674ee5671096ff1b14bc4c32deebd89fc1797

      SHA512

      8466383a1cb71ea8b049548fd5a41aaf01c0423743b886cd3cb5007f66bff87d8d5cfa67344451f4490c8f26e4ebf9e306075d5cfc655dc62f0813a456cf1330

    • C:\Users\Admin\AppData\Local\Temp\3bc1d00f0674053b830c8f7dd0524c7cc9e9bc903d8b8ed68ada0a0bfcea8f74.exe 

      Filesize

      1.4MB

      MD5

      1120682075df316620a28c0198cef6a4

      SHA1

      a6cd55e02f1fd57de0bc08386f7faa6460033f65

      SHA256

      2b692ee54ae1326f68226042e2ec048b66beea4e20afd5f18750c2730cb8555a

      SHA512

      54d9458ae7751e4d07112d99dd24aa22859377e2005285f2c5dfa7d1fa830ee960850cf5254023456126360139b46ecacba02cd6113aa371c9e3d86569091c9b

    • C:\Users\Admin\AppData\Local\Temp\tmp8B19.tmp.cmd

      Filesize

      131B

      MD5

      5b9e12b3bcf1205ffb4f5c9bbb0824d4

      SHA1

      57a06689b3a3d8ff20b846228a27603dfd887a70

      SHA256

      7fca4b8f56c6474ac8961126264d5b6799282ce709916e4099fd02f1bca33acd

      SHA512

      52643bd92dcfa89376c55382c29c10f019a6fd544d13ab57e84edd2a3503e162394e64a5d0509dd0624fd90b8d7458b11e6c89fbf1f5ae7dc8f09b92da895ba5

    • C:\Windows\Resources\Themes\explorer.exe

      Filesize

      135KB

      MD5

      86dcae6aea0dfc2deea201e65a7f600c

      SHA1

      327dad66e7e7896ce312904dbb45aa4ce1706495

      SHA256

      38e26316ba1689808fd66044c94c546984dbd4154805529e82f17ebef5961bc8

      SHA512

      9d6910b19309f42df99de0a30d347742e0123a6003479ba6872460ce2a442ad2a736f5293e3078d96e271c65ba438859cf0f12964e7ee78afdd1558c589ccb70

    • C:\Windows\Resources\Themes\icsys.icn.exe

      Filesize

      135KB

      MD5

      5a5f99e5c824c1137b3ab4b5bab4fe73

      SHA1

      423f3ce5205817f1526b10865b1fb196acbf81c3

      SHA256

      5dc470973a9e9ab655bbcbafbae0dac7848f3bbb68886689c0f1564faefca99e

      SHA512

      e224f9cea4606e657b7d2835017905c31cc72c1d445b19d0542f1ee5ff404cf615cb389573c37b548fbe99ab3bc4cec9cc0ff8f10b9b904475453e6526d03ec1

    • C:\Windows\Resources\spoolsv.exe

      Filesize

      135KB

      MD5

      5355f9c7b5658e18db247131b339662a

      SHA1

      75f36671e1fc4c44fe1be4cc8651d3a5ac3ad71d

      SHA256

      0389545f106e3ba15a43c21439d83e21e1c2c1c8ce09b70da235970b30e2eded

      SHA512

      1ad0ef3c1a5feae93523c6385ba6c19f1e8e8bd83b028026285ba2240aca7c1dc2a17ce2d383ff561aee329d8c9c00d99ed23798a220d0bd393fc38b2a0bd4a4

    • C:\Windows\Resources\svchost.exe

      Filesize

      135KB

      MD5

      af3d23c37967fbb6379127b0a2ea5923

      SHA1

      01ddb619110868a73ed1e55a65fae0d6f132d54b

      SHA256

      e4b550ca6686fdacb4c63bcc51a482e80d4bc00c0f8122c47ec594fd340fee11

      SHA512

      59abb086c5d3cebf939ab20c293003be2196f08c51bbaad763a1516b7fe204eb6f6028d27b79cf60fbbf2279e0aad25d3f2f490a1c32854871f668d2b005054d

    • memory/1772-106-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/2192-216-0x00007FFBE4E90000-0x00007FFBE5951000-memory.dmp

      Filesize

      10.8MB

    • memory/2192-209-0x0000000000A20000-0x0000000000A30000-memory.dmp

      Filesize

      64KB

    • memory/2192-217-0x0000000000A20000-0x0000000000A30000-memory.dmp

      Filesize

      64KB

    • memory/2192-204-0x00007FFBE4E90000-0x00007FFBE5951000-memory.dmp

      Filesize

      10.8MB

    • memory/2192-203-0x00000000001E0000-0x00000000001F0000-memory.dmp

      Filesize

      64KB

    • memory/2332-118-0x0000000000400000-0x0000000000560000-memory.dmp

      Filesize

      1.4MB

    • memory/2332-9-0x00000000022C0000-0x00000000022C1000-memory.dmp

      Filesize

      4KB

    • memory/2604-180-0x0000013F5C850000-0x0000013F5C8F4000-memory.dmp

      Filesize

      656KB

    • memory/2604-183-0x0000013F76F00000-0x0000013F76F10000-memory.dmp

      Filesize

      64KB

    • memory/2604-182-0x0000013F76F10000-0x0000013F76F86000-memory.dmp

      Filesize

      472KB

    • memory/2604-181-0x00007FFBE4E90000-0x00007FFBE5951000-memory.dmp

      Filesize

      10.8MB

    • memory/2604-206-0x00007FFBE4E90000-0x00007FFBE5951000-memory.dmp

      Filesize

      10.8MB

    • memory/4136-23-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4364-214-0x00000000005D0000-0x00000000005D1000-memory.dmp

      Filesize

      4KB

    • memory/4364-121-0x00000000005D0000-0x00000000005D1000-memory.dmp

      Filesize

      4KB

    • memory/4364-213-0x0000000000400000-0x0000000000560000-memory.dmp

      Filesize

      1.4MB

    • memory/4364-229-0x0000000000400000-0x0000000000560000-memory.dmp

      Filesize

      1.4MB

    • memory/4364-245-0x0000000000400000-0x0000000000560000-memory.dmp

      Filesize

      1.4MB

    • memory/4596-104-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4760-108-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4984-0-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4984-107-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/117064-222-0x00007FFBE4E90000-0x00007FFBE5951000-memory.dmp

      Filesize

      10.8MB

    • memory/117064-223-0x000000001BF00000-0x000000001BF10000-memory.dmp

      Filesize

      64KB

    • memory/117064-246-0x00007FFBE4E90000-0x00007FFBE5951000-memory.dmp

      Filesize

      10.8MB

    • memory/117064-247-0x000000001BF00000-0x000000001BF10000-memory.dmp

      Filesize

      64KB