Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 01:06 UTC

General

  • Target

    d4e6982fce9dbcd7cb34916a10e1e49c6fdfbef85b2773eb0516ae89b1bf877f.exe

  • Size

    581KB

  • MD5

    3887c0b99e35e5571dfbb9666ba95755

  • SHA1

    a2614a09c832ed1a4ef8ffa754d22b4e3e991c5b

  • SHA256

    d4e6982fce9dbcd7cb34916a10e1e49c6fdfbef85b2773eb0516ae89b1bf877f

  • SHA512

    7c6d5a6694c610c6dcaacca1bd61354958ebdcef4861d758ad496c938774fba1af3c64c3609e48ced83654fc26dfc3c30571114521b132f5cc932c0d41fd652a

  • SSDEEP

    12288:uy5Hukd8lEWd+f6BrWZLJLUf9snBS4csPYae6qfzIAA:95MrWhhUF54clNf7IB

Score
10/10

Malware Config

Signatures

  • Detects Echelon Stealer payload 1 IoCs
  • Echelon

    Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4e6982fce9dbcd7cb34916a10e1e49c6fdfbef85b2773eb0516ae89b1bf877f.exe
    "C:\Users\Admin\AppData\Local\Temp\d4e6982fce9dbcd7cb34916a10e1e49c6fdfbef85b2773eb0516ae89b1bf877f.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2172 -s 1324
      2⤵
        PID:2812

    Network

    • flag-us
      DNS
      api.ipify.org
      d4e6982fce9dbcd7cb34916a10e1e49c6fdfbef85b2773eb0516ae89b1bf877f.exe
      Remote address:
      8.8.8.8:53
      Request
      api.ipify.org
      IN A
      Response
      api.ipify.org
      IN A
      172.67.74.152
      api.ipify.org
      IN A
      104.26.13.205
      api.ipify.org
      IN A
      104.26.12.205
    • 172.67.74.152:443
      api.ipify.org
      tls
      d4e6982fce9dbcd7cb34916a10e1e49c6fdfbef85b2773eb0516ae89b1bf877f.exe
      347 B
      219 B
      5
      5
    • 8.8.8.8:53
      api.ipify.org
      dns
      d4e6982fce9dbcd7cb34916a10e1e49c6fdfbef85b2773eb0516ae89b1bf877f.exe
      59 B
      107 B
      1
      1

      DNS Request

      api.ipify.org

      DNS Response

      172.67.74.152
      104.26.13.205
      104.26.12.205

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2172-0-0x000007FEF5973000-0x000007FEF5974000-memory.dmp

      Filesize

      4KB

    • memory/2172-1-0x0000000000370000-0x0000000000408000-memory.dmp

      Filesize

      608KB

    • memory/2172-2-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

      Filesize

      9.9MB

    • memory/2172-3-0x000007FEF5973000-0x000007FEF5974000-memory.dmp

      Filesize

      4KB

    • memory/2172-4-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

      Filesize

      9.9MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.