Analysis

  • max time kernel
    308s
  • max time network
    304s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 15:05

General

  • Target

    2024-04-17_f49e304a05be6fb206a6ead8130ae8b6_ekans_eternalromance.exe

  • Size

    63.9MB

  • MD5

    f49e304a05be6fb206a6ead8130ae8b6

  • SHA1

    d9bed284d019da309ef9eb21f7dc537b12270c0a

  • SHA256

    22224274b8cae5885476e60705675edb03845d3728ab207fb0ab20dda464e66d

  • SHA512

    66b776a7cc9b3fa08388e4f6b8505451eae1ac197804a68f09d1637d5c029e61d144cff0fbe834203851fcb83011e20fbe2e66c1613de424cc70ed5d1589d3bf

  • SSDEEP

    786432:exS05J4yh46IoWZXoCysKIeHtQj5KYS3WP:eD5JUXoCysKIPQYS3WP

Malware Config

Signatures

  • Detected Ploutus loader 2 IoCs
  • Ploutus

    Ploutus is an ATM malware written in C#.

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables manipulated with Fody 4 IoCs
  • Nirsoft 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-17_f49e304a05be6fb206a6ead8130ae8b6_ekans_eternalromance.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-17_f49e304a05be6fb206a6ead8130ae8b6_ekans_eternalromance.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4584
    • C:\Users\Admin\AppData\Local\Temp\tmp3656198399.exe
      C:\Users\Admin\AppData\Local\Temp\tmp3656198399.exe /VisitTimeFilterType 1 /HistorySource 1 /LoadIE 1 /LoadFirefox 1 /LoadChrome 1 /LoadSafari 1 /scomma C:\Users\Admin\AppData\Local\Temp\tmp1563242077.csv /SaveDirect
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3772
    • C:\Users\Admin\AppData\Local\Temp\tmp73100209.exe
      C:\Users\Admin\AppData\Local\Temp\tmp73100209.exe /VisitTimeFilterType 1 /HistorySource 1 /LoadIE 1 /LoadFirefox 1 /LoadChrome 1 /LoadSafari 1 /scomma C:\Users\Admin\AppData\Local\Temp\tmp3994241598.csv /SaveDirect
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3896
    • C:\Users\Admin\AppData\Local\Temp\tmp3152572647.exe
      C:\Users\Admin\AppData\Local\Temp\tmp3152572647.exe -d C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations --csv C:\Users\Admin\AppData\Local\Temp\tmp632599451 -q
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:1984
    • C:\Users\Admin\AppData\Local\Temp\tmp4146193937\LECmd.exe
      C:\Users\Admin\AppData\Local\Temp\tmp4146193937\LECmd.exe -d c:/ --csv C:\Users\Admin\AppData\Local\Temp\tmp4146193937lecmd --csvf results.csv
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:1108
    • C:\Users\Admin\AppData\Local\Temp\tmp1856491138.exe
      C:\Users\Admin\AppData\Local\Temp\tmp1856491138.exe /VisitTimeFilterType 1 /HistorySource 1 /LoadIE 1 /LoadFirefox 1 /LoadChrome 1 /LoadSafari 1 /scomma C:\Users\Admin\AppData\Local\Temp\tmp1178762801.csv /SaveDirect
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4220
    • C:\Users\Admin\AppData\Local\Temp\tmp3766736782.exe
      C:\Users\Admin\AppData\Local\Temp\tmp3766736782.exe /VisitTimeFilterType 1 /HistorySource 1 /LoadIE 1 /LoadFirefox 1 /LoadChrome 1 /LoadSafari 1 /scomma C:\Users\Admin\AppData\Local\Temp\tmp694609405.csv /SaveDirect
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1596
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0968A1E3A40D2582E7FD463BAEB59CD

    Filesize

    1KB

    MD5

    285ec909c4ab0d2d57f5086b225799aa

    SHA1

    d89e3bd43d5d909b47a18977aa9d5ce36cee184c

    SHA256

    68b9c761219a5b1f0131784474665db61bbdb109e00f05ca9f74244ee5f5f52b

    SHA512

    4cf305b95f94c7a9504c53c7f2dc8068e647a326d95976b7f4d80433b2284506fc5e3bb9a80a4e9a9889540bbf92908dd39ee4eb25f2566fe9ab37b4dc9a7c09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0968A1E3A40D2582E7FD463BAEB59CD

    Filesize

    306B

    MD5

    d875ba85f328d2a7c8215953387f5979

    SHA1

    fc59ca3b939fbcdc1a8f1c175060b282dfcba76e

    SHA256

    bdd834b1356727a480fe87c7cb4d7158a518785eeaadc71328cde5037b8d234d

    SHA512

    97d5d7c4c553819e02418278497af4b8834d4da0a7d43256b0b398883c74af0ff45d4ceb667d3a6d3a86c8efe8f1c72d9b5d5c458f1eedb0d01b4485faa8e249

  • C:\Users\Admin\AppData\Local\Temp\chiCA3E.tmp

    Filesize

    192KB

    MD5

    8ccb6c13863fb6e99ed9a29a95f273fe

    SHA1

    b809aadcbd64fc29edb0cf27fb223784563a911f

    SHA256

    6b5e07d7137e1d3bee13888a7e8c81fae36ef046c9c7ba074e5fef67e6a594b4

    SHA512

    635bd5e4a1f9c0bf4dd331912f47d65de52496ae4e8fd8de84fac2008064c5c07b60fc33dd318cdf091ad9de2d14a0ff326a95d14f8084f0e5abbcaa98c7f0bb

  • C:\Users\Admin\AppData\Local\Temp\sqpCA4F.tmp

    Filesize

    5.0MB

    MD5

    a1148298fcd4d96c022941c6e9b173c6

    SHA1

    3ca7bfdf95ddb0a76b50c21e2d39b896a73296ca

    SHA256

    4445ac98128a170e6eea80a1d3dd79f5a66a52c3e208ed40e2a376fe0f82ca4d

    SHA512

    288241604eec8e217472df225c32a1a94e9940b392aaf52bfe98e91dc6a05b9a6d6b16f1931d026b39a20e4a78f38cefd5e2e4cbd61536ca93343e466cc1e68a

  • C:\Users\Admin\AppData\Local\Temp\tmp1740978822

    Filesize

    5B

    MD5

    c146a7a9edbe218b6ed3bcb62ec4ad24

    SHA1

    2808ac9ccb1acdcf5aff036d0f71f86fd51d13e9

    SHA256

    f067985d352d2da6dfaef4844a66d06c5371ecbd9530a4d195ac599fef8b3427

    SHA512

    4f275042bf4bd0401f7a6b3e89f69818958ce8ef5fee2fc5bb9152c232479cdd9ed471d09099ec3dd20f321c5dbbbdcd8f920783edc68eace705fdd2dd10463a

  • C:\Users\Admin\AppData\Local\Temp\tmp3152572647.exe

    Filesize

    4.2MB

    MD5

    030360a2cdbba7df39a7c2698b78ff73

    SHA1

    0f36bdec0a6603a53107065614182e6f44e3e7d3

    SHA256

    30d2e6dd472d5c55047852b6302b29d070d0da301d11990e5ba57f46bd69edfd

    SHA512

    143d294624a25a7a39784b788b6ce4c3367eb774140043c68ca35a9ce96d74cec44191a5ab3df94a3c95406e2639c61fa892625bf68bf58f0a89b0fdbc561c6e

  • C:\Users\Admin\AppData\Local\Temp\tmp3656198399.exe

    Filesize

    975KB

    MD5

    cc6fe70941a288634532ee999f133f33

    SHA1

    62de5dd97e2aafe521c8463287b08e5bf8c54def

    SHA256

    c50d3f139bc7ed05fb0f5e25671ec0268b577d5930f27964291cc8747970f2c3

    SHA512

    1fe494fe8fb10ea792c96b2dcce3e6339a082fbf2897a88c663cf937bf47c0e6ecab42311b7535ed41f81ea840bf4107f666f3b39f7df97a70e05a3dcc572aa6

  • C:\Users\Admin\AppData\Local\Temp\tmp3994241598.csv

    Filesize

    2KB

    MD5

    d43502cdceee07c054a447419501b1eb

    SHA1

    b5d3a03056e81655fdd59b6f0d6363baf242efec

    SHA256

    7a03a0c7a813c39983f3c516535aa7e26b67445d10f068de97f22a3d7e246ae9

    SHA512

    e835e646fa55b1bde09f0324deda4e8934ca99dd7c4343023f5e283d62b81c96d473a100beee7997ef656f926a0bf6a1513e21ac6a1f6d2ffc0eeb78a056a954

  • C:\Users\Admin\AppData\Local\Temp\tmp4146193937\LECmd.exe

    Filesize

    4.7MB

    MD5

    10e26753f3e1b6d9bc43d48776da1672

    SHA1

    fee7dbfcd10f3a78e4a6322a3c8a4cec2a2cfc7c

    SHA256

    94bc3f3cfb747e74147209d9e63c4b50cdbb141b4901fa95fcd30cac3764c91e

    SHA512

    523510dc92ffa11885874a4234bf245ef6d5d5f6596a7bac4eb6b1c3ab74e2de63cdf7719cdda2f84faa90c4d6fcda11b47478f7e503c8226f65949334c3b350

  • memory/1108-202-0x000001CFF2CD0000-0x000001CFF2D7A000-memory.dmp

    Filesize

    680KB

  • memory/1108-132-0x000001CFF1470000-0x000001CFF14AC000-memory.dmp

    Filesize

    240KB

  • memory/1108-262-0x000001CFF1D90000-0x000001CFF1DA0000-memory.dmp

    Filesize

    64KB

  • memory/1108-234-0x00007FFDA92A0000-0x00007FFDA9D61000-memory.dmp

    Filesize

    10.8MB

  • memory/1108-214-0x000001CFF2DA0000-0x000001CFF2DA8000-memory.dmp

    Filesize

    32KB

  • memory/1108-201-0x000001CFF2B40000-0x000001CFF2B50000-memory.dmp

    Filesize

    64KB

  • memory/1108-200-0x000001CFF2CA0000-0x000001CFF2CD6000-memory.dmp

    Filesize

    216KB

  • memory/1108-197-0x000001CFF2B20000-0x000001CFF2B3E000-memory.dmp

    Filesize

    120KB

  • memory/1108-194-0x000001CFF2B50000-0x000001CFF2B58000-memory.dmp

    Filesize

    32KB

  • memory/1108-184-0x000001CFF2AF0000-0x000001CFF2B16000-memory.dmp

    Filesize

    152KB

  • memory/1108-174-0x000001CFF1D70000-0x000001CFF1D78000-memory.dmp

    Filesize

    32KB

  • memory/1108-136-0x000001CFF1450000-0x000001CFF1460000-memory.dmp

    Filesize

    64KB

  • memory/1108-135-0x000001CFF1CC0000-0x000001CFF1D22000-memory.dmp

    Filesize

    392KB

  • memory/1108-125-0x000001CFEF390000-0x000001CFEF83E000-memory.dmp

    Filesize

    4.7MB

  • memory/1108-128-0x00007FFDA92A0000-0x00007FFDA9D61000-memory.dmp

    Filesize

    10.8MB

  • memory/1108-127-0x000001CFF1400000-0x000001CFF1428000-memory.dmp

    Filesize

    160KB

  • memory/1108-131-0x000001CFF1EA0000-0x000001CFF1FA0000-memory.dmp

    Filesize

    1024KB

  • memory/1108-130-0x000001CFF1D90000-0x000001CFF1DA0000-memory.dmp

    Filesize

    64KB

  • memory/1984-212-0x000002807BCB0000-0x000002807BCE0000-memory.dmp

    Filesize

    192KB

  • memory/1984-228-0x00007FFDA92A0000-0x00007FFDA9D61000-memory.dmp

    Filesize

    10.8MB

  • memory/1984-129-0x000002807B170000-0x000002807B26A000-memory.dmp

    Filesize

    1000KB

  • memory/1984-134-0x000002807B030000-0x000002807B04E000-memory.dmp

    Filesize

    120KB

  • memory/1984-126-0x000002807A7E0000-0x000002807A840000-memory.dmp

    Filesize

    384KB

  • memory/1984-87-0x0000028078620000-0x0000028078A5A000-memory.dmp

    Filesize

    4.2MB

  • memory/1984-121-0x0000028078E50000-0x0000028078E6A000-memory.dmp

    Filesize

    104KB

  • memory/1984-257-0x000002807BCE0000-0x000002807BCEC000-memory.dmp

    Filesize

    48KB

  • memory/1984-106-0x0000028078E00000-0x0000028078E12000-memory.dmp

    Filesize

    72KB

  • memory/1984-229-0x0000028078E40000-0x0000028078E50000-memory.dmp

    Filesize

    64KB

  • memory/1984-133-0x000002807B270000-0x000002807B34C000-memory.dmp

    Filesize

    880KB

  • memory/1984-215-0x000002807BD10000-0x000002807BD32000-memory.dmp

    Filesize

    136KB

  • memory/1984-118-0x0000028078E40000-0x0000028078E50000-memory.dmp

    Filesize

    64KB

  • memory/1984-195-0x000002807BC20000-0x000002807BC2A000-memory.dmp

    Filesize

    40KB

  • memory/1984-107-0x0000028078E10000-0x0000028078E24000-memory.dmp

    Filesize

    80KB

  • memory/1984-198-0x000002807BC40000-0x000002807BC76000-memory.dmp

    Filesize

    216KB

  • memory/1984-213-0x000002807BFA0000-0x000002807C036000-memory.dmp

    Filesize

    600KB

  • memory/1984-109-0x00007FFDA92A0000-0x00007FFDA9D61000-memory.dmp

    Filesize

    10.8MB

  • memory/1984-199-0x000002807BC80000-0x000002807BC90000-memory.dmp

    Filesize

    64KB

  • memory/4584-120-0x00007FF7876B0000-0x00007FF78AEAF000-memory.dmp

    Filesize

    56.0MB

  • memory/4584-157-0x00007FF7876B0000-0x00007FF78AEAF000-memory.dmp

    Filesize

    56.0MB

  • memory/4584-110-0x00007FF7876B0000-0x00007FF78AEAF000-memory.dmp

    Filesize

    56.0MB

  • memory/4584-117-0x00007FF7876B0000-0x00007FF78AEAF000-memory.dmp

    Filesize

    56.0MB

  • memory/4584-119-0x00007FF7876B0000-0x00007FF78AEAF000-memory.dmp

    Filesize

    56.0MB

  • memory/4584-227-0x00007FF7876B0000-0x00007FF78AEAF000-memory.dmp

    Filesize

    56.0MB

  • memory/4584-34-0x00007FF7876B0000-0x00007FF78AEAF000-memory.dmp

    Filesize

    56.0MB

  • memory/4584-4-0x00007FF7876B0000-0x00007FF78AEAF000-memory.dmp

    Filesize

    56.0MB

  • memory/4584-68-0x00007FF7876B0000-0x00007FF78AEAF000-memory.dmp

    Filesize

    56.0MB

  • memory/4584-235-0x00007FF7876B0000-0x00007FF78AEAF000-memory.dmp

    Filesize

    56.0MB

  • memory/4584-12-0x00007FF7876B0000-0x00007FF78AEAF000-memory.dmp

    Filesize

    56.0MB

  • memory/4584-11-0x00007FF7876B0000-0x00007FF78AEAF000-memory.dmp

    Filesize

    56.0MB

  • memory/4584-13-0x00007FF7876B0000-0x00007FF78AEAF000-memory.dmp

    Filesize

    56.0MB

  • memory/4584-35-0x00007FF7876B0000-0x00007FF78AEAF000-memory.dmp

    Filesize

    56.0MB