Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
8611d5b5aa1da83c21e54e5c9d7eaeb6b1adb1d14aa957cc2b3f531ce76b76ea.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8611d5b5aa1da83c21e54e5c9d7eaeb6b1adb1d14aa957cc2b3f531ce76b76ea.exe
Resource
win10v2004-20240508-en
General
-
Target
8611d5b5aa1da83c21e54e5c9d7eaeb6b1adb1d14aa957cc2b3f531ce76b76ea.exe
-
Size
405KB
-
MD5
7e98da214ee0846bc9dd31f14f1cbdd2
-
SHA1
6f0dcbc59121cd3771f4b0517497fac7ac041920
-
SHA256
8611d5b5aa1da83c21e54e5c9d7eaeb6b1adb1d14aa957cc2b3f531ce76b76ea
-
SHA512
bf351d29fa40e94d4b03e2662800b5eddc4556fae4299c9af47337eaae33bfb639107a536968731573c7da339de49f219cbf9922d5342f0190ea3973d8402179
-
SSDEEP
6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4z:gtRfJcNYFNm8UhlZGsez
Malware Config
Signatures
-
Blocklisted process makes network request 8 IoCs
flow pid Process 25 4128 rundll32.exe 32 4128 rundll32.exe 33 4128 rundll32.exe 34 4128 rundll32.exe 47 4128 rundll32.exe 49 4128 rundll32.exe 58 4128 rundll32.exe 75 4128 rundll32.exe -
Deletes itself 1 IoCs
pid Process 1320 nqpovlrry.exe -
Executes dropped EXE 1 IoCs
pid Process 1320 nqpovlrry.exe -
Loads dropped DLL 1 IoCs
pid Process 4128 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dotx = "c:\\windows\\SysWOW64\\rundll32.exe \"c:\\Program Files\\echno\\bezvn.dll\",Verify" rundll32.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\h: rundll32.exe File opened (read-only) \??\m: rundll32.exe File opened (read-only) \??\x: rundll32.exe File opened (read-only) \??\o: rundll32.exe File opened (read-only) \??\p: rundll32.exe File opened (read-only) \??\t: rundll32.exe File opened (read-only) \??\u: rundll32.exe File opened (read-only) \??\y: rundll32.exe File opened (read-only) \??\a: rundll32.exe File opened (read-only) \??\b: rundll32.exe File opened (read-only) \??\l: rundll32.exe File opened (read-only) \??\q: rundll32.exe File opened (read-only) \??\s: rundll32.exe File opened (read-only) \??\v: rundll32.exe File opened (read-only) \??\w: rundll32.exe File opened (read-only) \??\z: rundll32.exe File opened (read-only) \??\e: rundll32.exe File opened (read-only) \??\g: rundll32.exe File opened (read-only) \??\k: rundll32.exe File opened (read-only) \??\r: rundll32.exe File opened (read-only) \??\i: rundll32.exe File opened (read-only) \??\j: rundll32.exe File opened (read-only) \??\n: rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4128 rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification \??\c:\Program Files\echno nqpovlrry.exe File created \??\c:\Program Files\echno\bezvn.dll nqpovlrry.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1044 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe 4128 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4128 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3284 8611d5b5aa1da83c21e54e5c9d7eaeb6b1adb1d14aa957cc2b3f531ce76b76ea.exe 1320 nqpovlrry.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3284 wrote to memory of 2784 3284 8611d5b5aa1da83c21e54e5c9d7eaeb6b1adb1d14aa957cc2b3f531ce76b76ea.exe 92 PID 3284 wrote to memory of 2784 3284 8611d5b5aa1da83c21e54e5c9d7eaeb6b1adb1d14aa957cc2b3f531ce76b76ea.exe 92 PID 3284 wrote to memory of 2784 3284 8611d5b5aa1da83c21e54e5c9d7eaeb6b1adb1d14aa957cc2b3f531ce76b76ea.exe 92 PID 2784 wrote to memory of 1044 2784 cmd.exe 94 PID 2784 wrote to memory of 1044 2784 cmd.exe 94 PID 2784 wrote to memory of 1044 2784 cmd.exe 94 PID 2784 wrote to memory of 1320 2784 cmd.exe 97 PID 2784 wrote to memory of 1320 2784 cmd.exe 97 PID 2784 wrote to memory of 1320 2784 cmd.exe 97 PID 1320 wrote to memory of 4128 1320 nqpovlrry.exe 99 PID 1320 wrote to memory of 4128 1320 nqpovlrry.exe 99 PID 1320 wrote to memory of 4128 1320 nqpovlrry.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\8611d5b5aa1da83c21e54e5c9d7eaeb6b1adb1d14aa957cc2b3f531ce76b76ea.exe"C:\Users\Admin\AppData\Local\Temp\8611d5b5aa1da83c21e54e5c9d7eaeb6b1adb1d14aa957cc2b3f531ce76b76ea.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 -n 2&C:\Users\Admin\AppData\Local\Temp\\nqpovlrry.exe "C:\Users\Admin\AppData\Local\Temp\8611d5b5aa1da83c21e54e5c9d7eaeb6b1adb1d14aa957cc2b3f531ce76b76ea.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:1044
-
-
C:\Users\Admin\AppData\Local\Temp\nqpovlrry.exeC:\Users\Admin\AppData\Local\Temp\\nqpovlrry.exe "C:\Users\Admin\AppData\Local\Temp\8611d5b5aa1da83c21e54e5c9d7eaeb6b1adb1d14aa957cc2b3f531ce76b76ea.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1320 -
\??\c:\windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.exe "c:\Program Files\echno\bezvn.dll",Verify C:\Users\Admin\AppData\Local\Temp\nqpovlrry.exe4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4128
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4080,i,15140928051103392835,1612840580898364401,262144 --variations-seed-version --mojo-platform-channel-handle=4376 /prefetch:81⤵PID:1964
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406KB
MD5eae92bcce52a6a76c4e52c75f98102ac
SHA1abb69fdec94546cf72130ec5d8bc0f8d17e3607b
SHA2569b95f7e1cca92427a8e5b93c1074d263a4ef79effc39a6f01a82b5e44122349c
SHA512d477d3362df8f5a6e75a26a9f106b806e731c4cf66424e59b60770555247f2e7f425be6e7c2513883657454580fdbc13a4e1999e5e473afadcb2909667e139e6
-
Filesize
228KB
MD5b8162a2d9401c22d83e80633eea2a73b
SHA1fcea55155e08b1a0fb3421942d143ce9f7280ee1
SHA256b8f46de858f153e9a42ab7236e60d6b2b826644fccee734c1be9c91579a954a7
SHA512606a957b0f88cde782e91c64d1010c75d951439b0d37f3efdb800c8214ca690d4a1a487ebb279dc60cdbc7264e3209ddf79d37a485d8ea66053ea4cf07a367d3