Resubmissions

29/05/2024, 02:24

240529-cv1dbaeg8y 10

29/05/2024, 02:23

240529-ct89tsff35 10

29/05/2024, 02:22

240529-ctvrfaeg5s 10

29/05/2024, 02:18

240529-crpseaef6s 10

29/05/2024, 02:15

240529-cpnsbsfd57 10

29/05/2024, 02:14

240529-cpgn1see6y 10

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2024, 02:15

General

  • Target

    fd8ff9de932932bf7264ba598c7ae899b9cea81f998e3eb5e9d9f18dc2b428b2.elf

  • Size

    98KB

  • MD5

    102e77b70024942c692b36b962e9803b

  • SHA1

    8b2f2c397432ac5799a56e16e14d19f8dd428aad

  • SHA256

    fd8ff9de932932bf7264ba598c7ae899b9cea81f998e3eb5e9d9f18dc2b428b2

  • SHA512

    a232c523c59d020fec10303aa98b3ee04bac5bb49084fb8f0f6d5e226a62f5366742d00f58f8b905a20b9705cdd00bdf299e14004af400316ce8fc5be4a645f4

  • SSDEEP

    3072:RucT7B75gVPUbcj6/k6Sdz3DqzUNa0jLmCP:Ruc3d5ujCSp3Oaa0jv

Score
10/10

Malware Config

Signatures

  • Detected Echobot 1 IoCs
  • Echobot

    An updated variant of Mirai which infects a wide range of IoT devices to form a botnet.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\fd8ff9de932932bf7264ba598c7ae899b9cea81f998e3eb5e9d9f18dc2b428b2.elf
    1⤵
    • Modifies registry class
    PID:4600
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3604
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd8ff9de932932bf7264ba598c7ae899b9cea81f998e3eb5e9d9f18dc2b428b2.elf
      2⤵
      • Modifies Internet Explorer Phishing Filter
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3336
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd8ff9de932932bf7264ba598c7ae899b9cea81f998e3eb5e9d9f18dc2b428b2.elf
        3⤵
        • Modifies Internet Explorer settings
        PID:2372
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:82948 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2032
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\fd8ff9de932932bf7264ba598c7ae899b9cea81f998e3eb5e9d9f18dc2b428b2.elf
        3⤵
        • Modifies Internet Explorer settings
        PID:888
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:17422 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        PID:4960
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\fd8ff9de932932bf7264ba598c7ae899b9cea81f998e3eb5e9d9f18dc2b428b2.elf
        3⤵
        • Modifies Internet Explorer settings
        PID:1152
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\fd8ff9de932932bf7264ba598c7ae899b9cea81f998e3eb5e9d9f18dc2b428b2.elf
        3⤵
        • Modifies Internet Explorer settings
        PID:2424
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\fd8ff9de932932bf7264ba598c7ae899b9cea81f998e3eb5e9d9f18dc2b428b2.elf
        3⤵
        • Modifies Internet Explorer settings
        PID:2184
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\fd8ff9de932932bf7264ba598c7ae899b9cea81f998e3eb5e9d9f18dc2b428b2.elf
        3⤵
        • Modifies Internet Explorer settings
        PID:1652
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\fd8ff9de932932bf7264ba598c7ae899b9cea81f998e3eb5e9d9f18dc2b428b2.elf
        3⤵
        • Modifies Internet Explorer settings
        PID:1280
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\fd8ff9de932932bf7264ba598c7ae899b9cea81f998e3eb5e9d9f18dc2b428b2.elf
        3⤵
        • Modifies Internet Explorer settings
        PID:4312
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\fd8ff9de932932bf7264ba598c7ae899b9cea81f998e3eb5e9d9f18dc2b428b2.elf
        3⤵
        • Modifies Internet Explorer settings
        PID:3604
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\fd8ff9de932932bf7264ba598c7ae899b9cea81f998e3eb5e9d9f18dc2b428b2.elf
        3⤵
        • Modifies Internet Explorer settings
        PID:3772
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /7
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\en-US.1

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\~DFDFEB6F7A985ABF49.TMP

    Filesize

    16KB

    MD5

    fcc8ffdb4e1eeed4e60dd320b94461dc

    SHA1

    83b2f398a763e004fde0cc67e9d148e8f829241d

    SHA256

    28ee3d89a2a6a6bbf08fbed3c7145c62a1df65a6d9448517e790ef616f00c0b7

    SHA512

    0118246331c6ad37e8437d50a88998e5df60a6ebae8b8cdd5fd4a43183f4102cd438cf98ac0e9fd182b88325d1dab954e6e9eae68fd0333cf86ad5a02d5765cc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms

    Filesize

    3KB

    MD5

    ceb4fd131ecad542ea8f3270ef86f451

    SHA1

    623e6d1e9d1698b9cef6edc453ec56ab30a20a54

    SHA256

    2caba0d56335361ecc931ebd32c4dce7a43b84515e24000bedd5cd5970ea4f28

    SHA512

    389843744dcbdbf2afc9376cf291ca27325efe1b3b24ea0d202540c6f5b6874f06f360e0df3e9e8477a21ce7d25e3d43d9e3558e6b426ca969890aa679ab67be

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms

    Filesize

    3KB

    MD5

    bb54f78c683dd2d7925a0c4d564e690b

    SHA1

    c0e886946073a51bd47ee69207a4e7df5c80d3c5

    SHA256

    6457a1fc1f1e7a48bc32abad5f17404513023754b3af519582670d3d464dc464

    SHA512

    ebd02551e8365e69ed000de5351207fec2c018b3b4819187e99e692b9d742adac8db3567e6e0f1340bb7502ce0191963728e7d4599bb4f6e14cac9778d6bca54

  • C:\Users\Admin\Downloads\fd8ff9de932932bf7264ba598c7ae899b9cea81f998e3eb5e9d9f18dc2b428b2.elf

    Filesize

    98KB

    MD5

    102e77b70024942c692b36b962e9803b

    SHA1

    8b2f2c397432ac5799a56e16e14d19f8dd428aad

    SHA256

    fd8ff9de932932bf7264ba598c7ae899b9cea81f998e3eb5e9d9f18dc2b428b2

    SHA512

    a232c523c59d020fec10303aa98b3ee04bac5bb49084fb8f0f6d5e226a62f5366742d00f58f8b905a20b9705cdd00bdf299e14004af400316ce8fc5be4a645f4

  • memory/4476-109-0x0000020D6C300000-0x0000020D6C301000-memory.dmp

    Filesize

    4KB

  • memory/4476-108-0x0000020D6C300000-0x0000020D6C301000-memory.dmp

    Filesize

    4KB

  • memory/4476-119-0x0000020D6C300000-0x0000020D6C301000-memory.dmp

    Filesize

    4KB

  • memory/4476-118-0x0000020D6C300000-0x0000020D6C301000-memory.dmp

    Filesize

    4KB

  • memory/4476-117-0x0000020D6C300000-0x0000020D6C301000-memory.dmp

    Filesize

    4KB

  • memory/4476-116-0x0000020D6C300000-0x0000020D6C301000-memory.dmp

    Filesize

    4KB

  • memory/4476-115-0x0000020D6C300000-0x0000020D6C301000-memory.dmp

    Filesize

    4KB

  • memory/4476-114-0x0000020D6C300000-0x0000020D6C301000-memory.dmp

    Filesize

    4KB

  • memory/4476-113-0x0000020D6C300000-0x0000020D6C301000-memory.dmp

    Filesize

    4KB

  • memory/4476-107-0x0000020D6C300000-0x0000020D6C301000-memory.dmp

    Filesize

    4KB