Overview
overview
5Static
static
3net8.0/Ech...s.json
windows7-x64
3net8.0/Ech...s.json
windows10-2004-x64
3net8.0/Ech...us.exe
windows7-x64
1net8.0/Ech...us.exe
windows10-2004-x64
1net8.0/Ech...us.exe
windows7-x64
1net8.0/Ech...us.exe
windows10-2004-x64
1net8.0/Ech...us.pdb
windows7-x64
3net8.0/Ech...us.pdb
windows10-2004-x64
3net8.0/Ech...g.json
windows7-x64
3net8.0/Ech...g.json
windows10-2004-x64
3net8.0/New...on.dll
windows7-x64
5net8.0/New...on.dll
windows10-2004-x64
1net8.0/Ope...rp.dll
windows7-x64
1net8.0/Ope...rp.dll
windows10-2004-x64
1net8.0/Ope...um.dll
windows7-x64
1net8.0/Ope...um.dll
windows10-2004-x64
1net8.0/Sec...s.json
windows7-x64
3net8.0/Sec...s.json
windows10-2004-x64
3net8.0/Sec...ay.exe
windows7-x64
1net8.0/Sec...ay.exe
windows10-2004-x64
1net8.0/Sec...ay.pdb
windows7-x64
3net8.0/Sec...ay.pdb
windows10-2004-x64
3net8.0/Sec...g.json
windows7-x64
3net8.0/Sec...g.json
windows10-2004-x64
3net8.0/Sys...om.dll
windows7-x64
1net8.0/Sys...om.dll
windows10-2004-x64
1net8.0/Sys...nt.dll
windows7-x64
1net8.0/Sys...nt.dll
windows10-2004-x64
1net8.0/WebDriver.dll
windows7-x64
1net8.0/WebDriver.dll
windows10-2004-x64
1net8.0/run...rn.dll
windows7-x64
1net8.0/run...rn.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
net8.0/Echoes of Al Andalus.deps.json
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
net8.0/Echoes of Al Andalus.deps.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
net8.0/Echoes of Al Andalus.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
net8.0/Echoes of Al Andalus.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
net8.0/Echoes of Al Andalus.exe
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
net8.0/Echoes of Al Andalus.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
net8.0/Echoes of Al Andalus.pdb
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
net8.0/Echoes of Al Andalus.pdb
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
net8.0/Echoes of Al Andalus.runtimeconfig.json
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
net8.0/Echoes of Al Andalus.runtimeconfig.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
net8.0/Newtonsoft.Json.dll
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
net8.0/Newtonsoft.Json.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
net8.0/OpenCvSharp.dll
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
net8.0/OpenCvSharp.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
net8.0/OpenQA.Selenium.Winium.dll
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
net8.0/OpenQA.Selenium.Winium.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
net8.0/SecurityHealthSystray.deps.json
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
net8.0/SecurityHealthSystray.deps.json
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
net8.0/SecurityHealthSystray.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
net8.0/SecurityHealthSystray.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
net8.0/SecurityHealthSystray.pdb
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
net8.0/SecurityHealthSystray.pdb
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
net8.0/SecurityHealthSystray.runtimeconfig.json
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
net8.0/SecurityHealthSystray.runtimeconfig.json
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
net8.0/System.CodeDom.dll
Resource
win7-20240419-en
Behavioral task
behavioral26
Sample
net8.0/System.CodeDom.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
net8.0/System.Management.dll
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
net8.0/System.Management.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
net8.0/WebDriver.dll
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
net8.0/WebDriver.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
net8.0/runtimes/win-x64/native/OpenCvSharpExtern.dll
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
net8.0/runtimes/win-x64/native/OpenCvSharpExtern.dll
Resource
win10v2004-20240508-en
General
-
Target
net8.0/Echoes of Al Andalus.pdb
-
Size
12KB
-
MD5
0dc5b953eac0f3fe6fa681485c8af1b2
-
SHA1
3b40f84aa3e6cf0ef0afc8b3a76456b3364da215
-
SHA256
0306e6accd9696aef15194067cc1f6efce4c87e4402ff1a60fc30f7a27a86ff8
-
SHA512
e75ac903d172959b9d4d83082c9ff9fd4c646cc997e914e4b8268d1c8f67061c146372e6b9453cbc23933a1575a70f14ea1db7a3340f0d0cb5addec42464e7bf
-
SSDEEP
384:f7mYqucscXCH4a0sv+upEqrq6GUmgtHThtbHgfopsync7cY2ucoc:aYqyrmezfYG
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pdb_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pdb_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.pdb\ = "pdb_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pdb_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pdb_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pdb_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.pdb rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pdb_auto_file\shell rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3056 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3056 AcroRd32.exe 3056 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2112 2116 cmd.exe 29 PID 2116 wrote to memory of 2112 2116 cmd.exe 29 PID 2116 wrote to memory of 2112 2116 cmd.exe 29 PID 2112 wrote to memory of 3056 2112 rundll32.exe 30 PID 2112 wrote to memory of 3056 2112 rundll32.exe 30 PID 2112 wrote to memory of 3056 2112 rundll32.exe 30 PID 2112 wrote to memory of 3056 2112 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\net8.0\Echoes of Al Andalus.pdb"1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\net8.0\Echoes of Al Andalus.pdb2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\net8.0\Echoes of Al Andalus.pdb"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e8d866c61773b9f373018d3d28f4c570
SHA11ad94cc5e9eb90e4d6859f5a3b1a7b068d2201ce
SHA2565bfc847a68566f2ca881f49ef6d4485cf04f33fd69957374619abc4f34f67524
SHA5120f3bf706754f568846df59b114b7a71ba7b128c9458ec962e9bbea35d543ca0f4329c09bfcbd86b14a959d96f22e120d46a7b78f2e54f37067e3359f462c7ca5