Analysis

  • max time kernel
    311s
  • max time network
    49s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 00:20

General

  • Target

    Echo Mirage.7z

  • Size

    9.5MB

  • MD5

    5da7ca6f6f3c3ee8dd1d86f174d1f557

  • SHA1

    3c724b5752f7d8fa0852e91fe656c72c24b3a83a

  • SHA256

    c755e54f2688d8786a2e3770977674421e9346183997618dbb9795d4aebc1117

  • SHA512

    3062d94c7a07185fbb10baefd2ef831c1ce1543f2e01116c74b7ca040bc2625c7ee48518d4f09c77345e892c2a9bb35c26e9e95ccfeeb97d738ff5302239ae14

  • SSDEEP

    196608:Qke4SKN+njhTTcT0twzaXvt16TomFIZSWupLkyrIRXelLCqzncjQ:NecNU5ThtLvgJFYqpLkyrxlLC8cE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Obfuscated with Agile.Net obfuscator 5 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 54 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Echo Mirage.7z"
    1⤵
    • Modifies registry class
    PID:4756
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4784
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4772
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Echo Mirage.7z"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4112
    • C:\Users\Admin\Desktop\Echo Mirage\EchoMirage.exe
      "C:\Users\Admin\Desktop\Echo Mirage\EchoMirage.exe"
      1⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Users\Admin\Desktop\429635927.exe
        "C:\Users\Admin\Desktop\429635927.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4320

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\429635927.exe
      Filesize

      7.5MB

      MD5

      e74eafef23a34eec03b91aa62493ca15

      SHA1

      94bf8bba4fe1e973a5ac6739127c16d645d1156a

      SHA256

      1ffda4e6f64f044ffa2a79d8cf710b02014e7da5cd60300e8b08f615d5f81cc0

      SHA512

      9cf9a1dea10cd37af4975425f005552ff0405670c92376cdade41315911e3f6471b3ac25852ea8a21e31d94bc404de7a1336ac0322d049d562670e8f61fc81aa

    • C:\Users\Admin\Desktop\Echo Mirage\EchoMirage.exe
      Filesize

      6.3MB

      MD5

      b859c2f0ed7bea595f632163f78a3b9e

      SHA1

      ff171191ce3d405db917b652f8b0a502f6a66f11

      SHA256

      d10ad92caff49ee4737a577b72e7647d0d3d06a4feb7d515ec44a6163edcab2e

      SHA512

      83a4a2f4f68c30dd4c298ba57666c85fec84102ff794c0388bea79aa972c31b1f2de43f60e27f46f807867f5601c8b35aba6eaaf734074f183c99fa4d37b2ac5

    • C:\Users\Admin\Desktop\Echo Mirage\EchoMirageHooks32.dll
      Filesize

      443KB

      MD5

      e1390e79577ab2dd75e17250e73d4abe

      SHA1

      457b9a21f6b7a0e8297d6aa61c2cedb85adcd907

      SHA256

      2c232c3e196cbb2651fd0c6187697cc4bae752c2b471875943a2dac9d8b02db0

      SHA512

      4a4cdd4b66f7b39a56a5eec8a0c7e29340f4b032edd8da246feaf5dd2d4847d2586ffe64f172132d79b3f2a66ce1f861dc700e5eec83689de672eb103f2234e2

    • C:\Users\Admin\Desktop\Echo Mirage\EchoMirageUnelevated.exe
      Filesize

      282KB

      MD5

      708c0ca4057bfa069fa456c43ef3ba07

      SHA1

      c50d48178837dffa7b0f00b28ac39139dbc98972

      SHA256

      8b9cc2596c0434d223cc84627c770dcf9eb58180e18a2be2cede741a50e3158b

      SHA512

      e0648ff5b8b054ddf6efd3a39e00e9e47b5d98125102ec2f1421fa4b63d5089c2f984cadcbffd9a8d57d41f58561c2dee81e2993e9258c8490ec13644e53bcc3

    • C:\Users\Admin\Desktop\Echo Mirage\unins000.exe
      Filesize

      787KB

      MD5

      16f9bd410649d056813ec6e512f27e0b

      SHA1

      ee003f3df76f564f82e2f455417af03f9e9f181f

      SHA256

      39493b65a2ebc5a08c4ff8e5b5137114b927d7c99b69bb7d0f4f7a7603f99fff

      SHA512

      62507c25ddb1a77519eea51a2a24e5f5c1953b8b28125300e74ed2159c97ebc605f7d09843f017b4f0337f3bc32b61b996cbc739043a49d418b228cbe6719025

    • memory/2080-38-0x0000000000400000-0x0000000000A73000-memory.dmp
      Filesize

      6.4MB

    • memory/4320-27-0x0000000002C80000-0x0000000002CFA000-memory.dmp
      Filesize

      488KB

    • memory/4320-28-0x0000000000400000-0x0000000000FC3000-memory.dmp
      Filesize

      11.8MB

    • memory/4320-30-0x00000000010B0000-0x00000000010B1000-memory.dmp
      Filesize

      4KB

    • memory/4320-31-0x0000000002D00000-0x0000000002D40000-memory.dmp
      Filesize

      256KB

    • memory/4320-29-0x0000000000400000-0x0000000000FC3000-memory.dmp
      Filesize

      11.8MB

    • memory/4320-32-0x0000000076330000-0x0000000076545000-memory.dmp
      Filesize

      2.1MB

    • memory/4320-33-0x0000000077740000-0x00000000779C1000-memory.dmp
      Filesize

      2.5MB

    • memory/4320-34-0x0000000075C90000-0x0000000075D73000-memory.dmp
      Filesize

      908KB

    • memory/4320-35-0x0000000000400000-0x0000000000FC3000-memory.dmp
      Filesize

      11.8MB

    • memory/4320-36-0x0000000073470000-0x00000000734F9000-memory.dmp
      Filesize

      548KB

    • memory/4320-37-0x0000000000400000-0x0000000000FC3000-memory.dmp
      Filesize

      11.8MB

    • memory/4320-39-0x0000000009DE0000-0x000000000A7D2000-memory.dmp
      Filesize

      9.9MB

    • memory/4320-40-0x000000000A7D0000-0x000000000AA94000-memory.dmp
      Filesize

      2.8MB

    • memory/4320-41-0x000000000ABC0000-0x000000000ACD9000-memory.dmp
      Filesize

      1.1MB

    • memory/4320-42-0x000000000ABC0000-0x000000000ACD9000-memory.dmp
      Filesize

      1.1MB

    • memory/4320-43-0x000000000ABC0000-0x000000000ACD9000-memory.dmp
      Filesize

      1.1MB

    • memory/4320-59-0x0000000010000000-0x0000000010005000-memory.dmp
      Filesize

      20KB

    • memory/4320-57-0x0000000010000000-0x0000000010005000-memory.dmp
      Filesize

      20KB

    • memory/4320-55-0x0000000010000000-0x0000000010005000-memory.dmp
      Filesize

      20KB

    • memory/4320-53-0x0000000010000000-0x0000000010005000-memory.dmp
      Filesize

      20KB

    • memory/4320-52-0x0000000010000000-0x0000000010005000-memory.dmp
      Filesize

      20KB

    • memory/4320-63-0x0000000076E50000-0x0000000077403000-memory.dmp
      Filesize

      5.7MB

    • memory/4320-64-0x000000000F860000-0x000000000F8F2000-memory.dmp
      Filesize

      584KB

    • memory/4320-68-0x0000000077A90000-0x0000000077AB4000-memory.dmp
      Filesize

      144KB

    • memory/4320-67-0x0000000076330000-0x0000000076545000-memory.dmp
      Filesize

      2.1MB

    • memory/4320-70-0x0000000076570000-0x0000000076690000-memory.dmp
      Filesize

      1.1MB

    • memory/4320-66-0x0000000000400000-0x0000000000FC3000-memory.dmp
      Filesize

      11.8MB

    • memory/4320-73-0x0000000075EF0000-0x0000000075FAF000-memory.dmp
      Filesize

      764KB

    • memory/4320-72-0x0000000076C10000-0x0000000076C85000-memory.dmp
      Filesize

      468KB

    • memory/4320-71-0x0000000075FB0000-0x000000007606F000-memory.dmp
      Filesize

      764KB

    • memory/4320-69-0x00000000776A0000-0x000000007771B000-memory.dmp
      Filesize

      492KB

    • memory/4320-76-0x0000000002C80000-0x0000000002CFA000-memory.dmp
      Filesize

      488KB

    • memory/4320-83-0x00000000751A0000-0x00000000751AF000-memory.dmp
      Filesize

      60KB

    • memory/4320-89-0x0000000073470000-0x00000000734F9000-memory.dmp
      Filesize

      548KB

    • memory/4320-94-0x0000000003920000-0x0000000003938000-memory.dmp
      Filesize

      96KB

    • memory/4320-96-0x000000006F190000-0x000000006F1BB000-memory.dmp
      Filesize

      172KB

    • memory/4320-95-0x000000006F1C0000-0x000000006F2A3000-memory.dmp
      Filesize

      908KB

    • memory/4320-93-0x0000000003330000-0x0000000003336000-memory.dmp
      Filesize

      24KB

    • memory/4320-92-0x0000000076550000-0x0000000076569000-memory.dmp
      Filesize

      100KB

    • memory/4320-91-0x00000000728E0000-0x00000000728F2000-memory.dmp
      Filesize

      72KB

    • memory/4320-90-0x0000000073360000-0x0000000073465000-memory.dmp
      Filesize

      1.0MB

    • memory/4320-87-0x0000000074910000-0x00000000749BB000-memory.dmp
      Filesize

      684KB

    • memory/4320-86-0x00000000749C0000-0x00000000749D4000-memory.dmp
      Filesize

      80KB

    • memory/4320-82-0x00000000751B0000-0x000000007523D000-memory.dmp
      Filesize

      564KB

    • memory/4320-81-0x00000000774B0000-0x00000000774F5000-memory.dmp
      Filesize

      276KB

    • memory/4320-80-0x0000000075270000-0x0000000075294000-memory.dmp
      Filesize

      144KB

    • memory/4320-79-0x0000000076D80000-0x0000000076DE3000-memory.dmp
      Filesize

      396KB

    • memory/4320-77-0x0000000077410000-0x00000000774A6000-memory.dmp
      Filesize

      600KB

    • memory/4320-84-0x0000000075190000-0x0000000075198000-memory.dmp
      Filesize

      32KB

    • memory/4320-75-0x0000000075970000-0x00000000759C2000-memory.dmp
      Filesize

      328KB

    • memory/4320-78-0x0000000077740000-0x00000000779C1000-memory.dmp
      Filesize

      2.5MB

    • memory/4320-135-0x0000000000400000-0x0000000000FC3000-memory.dmp
      Filesize

      11.8MB