Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 04:40

General

  • Target

    echo.exe

  • Size

    133.1MB

  • MD5

    bfadc181245478806f97cfbaf4e06c57

  • SHA1

    723a150dcbeffed304ed3421a6b35c61d1b009b6

  • SHA256

    2312e8fb1738a48e0527464968cbabd8d02dbf69cde9e3cb61dcd47d78ad1381

  • SHA512

    09c1116b78954066fb050f22a46402d91e05b6f7225432e8989863c198ebe01155b4a9432a9665dffbaba82b72ac12016b5587284bc9df3b52403dfbbec54b33

  • SSDEEP

    786432:xcgzAL4pDrN1IeBzLwgB7jpjCuaZuggecoBxjQHikt3lumUPQbGaCRP:2dL4pfTIeVLwgB/cuafC11Px

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\echo.exe
    "C:\Users\Admin\AppData\Local\Temp\echo.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Users\Admin\AppData\Local\Temp\echo.exe
      "C:\Users\Admin\AppData\Local\Temp\echo.exe" --type=gpu-process --field-trial-handle=1608,7588697082596155615,641256586861443668,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --user-data-dir="C:\Users\Admin\AppData\Roaming\echo" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAANAAAAEAAAAAAAAAABAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 /prefetch:2
      2⤵
        PID:1412
      • C:\Users\Admin\AppData\Local\Temp\echo.exe
        "C:\Users\Admin\AppData\Local\Temp\echo.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1608,7588697082596155615,641256586861443668,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\echo" --mojo-platform-channel-handle=1860 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4764
      • C:\Users\Admin\AppData\Local\Temp\echo.exe
        "C:\Users\Admin\AppData\Local\Temp\echo.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\echo" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --field-trial-handle=1608,7588697082596155615,641256586861443668,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2364 /prefetch:1
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        PID:5032
      • C:\Users\Admin\AppData\Local\Temp\echo.exe
        "C:\Users\Admin\AppData\Local\Temp\echo.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\echo" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-websql --field-trial-handle=1608,7588697082596155615,641256586861443668,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3672 /prefetch:1
        2⤵
        • Checks computer location settings
        PID:3244
      • C:\Users\Admin\AppData\Local\Temp\echo.exe
        "C:\Users\Admin\AppData\Local\Temp\echo.exe" --type=gpu-process --field-trial-handle=1608,7588697082596155615,641256586861443668,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\echo" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAIAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAANAAAAEAAAAAAAAAABAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1968 /prefetch:2
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2536
    • C:\Windows\System32\CompPkgSrv.exe
      C:\Windows\System32\CompPkgSrv.exe -Embedding
      1⤵
        PID:3504

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Roaming\echo\Network Persistent State

        Filesize

        1KB

        MD5

        dd2fdd3b9328f85315374322573e1311

        SHA1

        fb0a08c298794872236bc1a721843c6503422d91

        SHA256

        b949a99f970f4e196dcee29564a1d098851fb39ac3c75afb3ad4a53d1f9769e0

        SHA512

        b7c7dc45e93b13f83e4ec346c2cc773ba0a78cf313014f76fd1814173ca3bdf64ad3127599fe66a122258de44c358fef4aa2d95092553db9abec09e61a3e7c5e

      • C:\Users\Admin\AppData\Roaming\echo\Network Persistent State~RFe58b8bc.TMP

        Filesize

        59B

        MD5

        2800881c775077e1c4b6e06bf4676de4

        SHA1

        2873631068c8b3b9495638c865915be822442c8b

        SHA256

        226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

        SHA512

        e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

      • C:\Users\Admin\AppData\Roaming\echo\Preferences

        Filesize

        57B

        MD5

        58127c59cb9e1da127904c341d15372b

        SHA1

        62445484661d8036ce9788baeaba31d204e9a5fc

        SHA256

        be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

        SHA512

        8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

      • C:\Users\Admin\AppData\Roaming\echo\Preferences~RFe57ccd5.TMP

        Filesize

        202B

        MD5

        01ae3fc8ed8354495892f7c662dff8f2

        SHA1

        1565b4b1e589830df0c5c03e88427758a09f4f2b

        SHA256

        c4c42a1c8f3115bd2a468ccc99c118cc37835500ef5076147723ae69955561b7

        SHA512

        6445ab923f365c67f5016c3dde54556be2a6c6657b5fe306ab8dcd8a4ed1bac161bf09a9312acb011eadbc4e9a83d88ec1297722148e73cd3ddd2edd2862f8f9

      • C:\Users\Admin\AppData\Roaming\echo\Service Worker\Database\MANIFEST-000001

        Filesize

        41B

        MD5

        5af87dfd673ba2115e2fcf5cfdb727ab

        SHA1

        d5b5bbf396dc291274584ef71f444f420b6056f1

        SHA256

        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

        SHA512

        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

      • C:\Users\Admin\AppData\Roaming\echo\Service Worker\ScriptCache\index-dir\the-real-index

        Filesize

        48B

        MD5

        ec98b39e65f335cc61d88f111819f92f

        SHA1

        a9831bd13952c947e0a57d3d706002f0cefd8b6a

        SHA256

        85b5defae0c0ed5afed4fd4a18c89e37c452f260abd1a30a1553b10d77f83065

        SHA512

        b74f417126524fd006c1ea385a4ed2734eb0337458fea96cb7954abb12fe5660f15615d27453f01e9e784d439213384dc57fb5a25caaf367b1c80a087ff236bb

      • C:\Users\Admin\AppData\Roaming\echo\Service Worker\ScriptCache\index-dir\the-real-index~RFe57f8d7.TMP

        Filesize

        72B

        MD5

        68e161a1ce8182626b0c7256767c34ce

        SHA1

        f14f31281ce52f97e6c6215a7bbbda4fe49ddf9d

        SHA256

        b85feebb526526b5e9ffbf591a08b6cc41ed2c5418894eb1c69da470638267ae

        SHA512

        0f0d2979b55ae82dd63426a5ab714d7f7466358b954fca91e38d893f9ab942d060fc49d165226191d5033ee489341f084d4b4c8165ab6e2fcfa5da0ca6241fd2

      • C:\Users\Admin\AppData\Roaming\echo\Session Storage\CURRENT

        Filesize

        16B

        MD5

        46295cac801e5d4857d09837238a6394

        SHA1

        44e0fa1b517dbf802b18faf0785eeea6ac51594b

        SHA256

        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

        SHA512

        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

      • C:\Users\Admin\AppData\Roaming\echo\extensions\fmkadmapgofadopljbjfkapdkoienihi\build\prepareInjection.js

        Filesize

        1KB

        MD5

        1de10732e6d50c3a4ebf0b3a8d3a43f1

        SHA1

        065161d944b10728a2dbd673988c20cee1639ceb

        SHA256

        b51e4c56e9916093f02b4889633ed313dee7f6f8393c808dc039a92ad9489729

        SHA512

        e11e7312ebbc06896f82c26d74a0edca7f4014ebba06031ec7452994bbdcb6e01df8b10e5a0d30ce4f8ec1174383bbd7efc31b243b5386b52e8d0aaa9bffb344

      • C:\Users\Admin\AppData\Roaming\echo\extensions\fmkadmapgofadopljbjfkapdkoienihi\icons\128-deadcode.png

        Filesize

        2KB

        MD5

        95c2da7d58ac4f57f4162d4b521d1c2a

        SHA1

        964c06f2b50bd34c77ff760c939ccafccb8298da

        SHA256

        e3e4ce549604652a6a573550f34b3994992d7d70bfd39bf69fc30cfd769b75f8

        SHA512

        765ddb52aed9c28e7ccf22768b432e7391a407cbbd0be75722ff59f438ed7208eb94b78cfa1a90701f2dede8f153169d2caa379355f2b3532e465878f336e2c5

      • C:\Users\Admin\AppData\Roaming\echo\extensions\fmkadmapgofadopljbjfkapdkoienihi\icons\128-restricted.png

        Filesize

        1KB

        MD5

        976735be5c5ef4986782407579e25c50

        SHA1

        1a72c6f1fea87fe8e79d14c72ad5da6ab6d9b761

        SHA256

        cbde2b973624ad785f37523efecca9721813354f2a7e21ecd305560acc138c06

        SHA512

        8288ebd7f1bcfccacd9092a30f09ac141620710400856300f1c1056e7012c3066fadc8128c6ca1d567a289af3967cd8c9b3d562421e00132fe9680e4172f56c0

      • C:\Users\Admin\AppData\Roaming\echo\extensions\fmkadmapgofadopljbjfkapdkoienihi\icons\16-deadcode.png

        Filesize

        338B

        MD5

        2bd352e9368664c7aba97f61df7c407f

        SHA1

        232e5ea71cfa6276254862afdff99835136a4f31

        SHA256

        705902c00dc5cf4ac85d9eac512a17b2e0bb427dc98cb2cc8f19322a95600076

        SHA512

        7fa71202d4aa7eab73e4695c5c6a1a667ee2e8ed2eb2839bcc8da5404f0edf54d20e095df6af9bfb95a08f6044b3e2f51ee85bf2d28440aefa35d2af8362bf1a

      • C:\Users\Admin\AppData\Roaming\echo\extensions\fmkadmapgofadopljbjfkapdkoienihi\icons\16-restricted.png

        Filesize

        288B

        MD5

        7b2b93a5c23de8b45be5076bec86cc03

        SHA1

        7bf00b51cee062b2a6f0e7ba8e6fe892b2665e96

        SHA256

        131e9ff247e8e9257351129b203709d8a8a25488f7159b498d661ba8510efd7e

        SHA512

        93be1bebae3a2ccc5fcd8ad97b96529e6dd7f8eb1f68fa6a20a7c6c006222ade42915f5bc0199ad2b2258272e9001969a830d6a0536ce0b127176465c5b082ce

      • C:\Users\Admin\AppData\Roaming\echo\extensions\fmkadmapgofadopljbjfkapdkoienihi\icons\32-deadcode.png

        Filesize

        561B

        MD5

        7d81fdce34f01d8229f67cbed8ca30de

        SHA1

        2d147ca07846a5c33271a3cd9fee58be0b041088

        SHA256

        53b429c91414bee3fe255328029eff513f172fffc41fd63d95aaadb697ce71a5

        SHA512

        4e64518b53c83c075bade7171989a7f796f7d4ac63ddab47ae938bb55ade22a1ea04c208a16c4ec87a6535a57100eb51b7f80b24887c2a96eb2f5758e2615d22

      • C:\Users\Admin\AppData\Roaming\echo\extensions\fmkadmapgofadopljbjfkapdkoienihi\icons\32-restricted.png

        Filesize

        490B

        MD5

        a224d8a9e39b203054da833b0636ff06

        SHA1

        8acf99866b257c7b5b38c5708870cd17d3d7b13a

        SHA256

        1141df69cf1d1985c49f795b65acba57e4d2399e6ff50bb3e6bdc0b710f27804

        SHA512

        7c4d5daa2fb4a7285dd747287ba56e3c484973cb9f01a49dc0926aab0d4ae0295586707ea312560782abed6409a62ef3367907fa77863276cfbed85449b16315

      • C:\Users\Admin\AppData\Roaming\echo\extensions\fmkadmapgofadopljbjfkapdkoienihi\icons\48-deadcode.png

        Filesize

        826B

        MD5

        5514edc867b037351d2d01cb8b204d3c

        SHA1

        55070782e7049bf2d6c45be7605d193630f22eb1

        SHA256

        546c0260ab5a03c3075e9278956019214bb6433de266c6f95b7021c0115070e2

        SHA512

        f8ab9ad7e9ab9836580b6d99415250d01dd8be53a01a4e0658031d25d7c891f4e8ae4add8a86aae55522d118a771c2625d359aa504cf52244433955301d17079

      • C:\Users\Admin\AppData\Roaming\echo\extensions\fmkadmapgofadopljbjfkapdkoienihi\icons\48-restricted.png

        Filesize

        730B

        MD5

        f1198971a65f0c320a18931b5a6e9e03

        SHA1

        5783485687ae3ab6bcbb07f203dcb92211ada979

        SHA256

        0ddff2151123e022e007e09576a6b030c38021d0fffc7546f0c9a1b8529813e2

        SHA512

        bda8969740bb4320095f4d5b4bb185ec8f881307640eec1d917c20c0f65b7d43ade107334de6d01ee7334930909e55090cb7eea771ac2e199db6b811d72ee512

      • C:\Users\Admin\AppData\Roaming\echo\extensions\fmkadmapgofadopljbjfkapdkoienihi\icons\development.svg

        Filesize

        3KB

        MD5

        46bb24f5f8540049a459da5b12ee1478

        SHA1

        e8189f6545038616eca6ef33068093dbaeb66350

        SHA256

        acc667332543cd491097b281fd35bd49bf435768d4cb2ab8f579740072756313

        SHA512

        89b74512db2792b409f1ceaa275fb1e8d7eefdb195bcab76c7b489228c822a6a68182d93c485956d16c02e310e4d3d3f6da7a561f93d0e0034627339d6848776

      • C:\Users\Admin\AppData\Roaming\echo\extensions\fmkadmapgofadopljbjfkapdkoienihi\icons\restricted.svg

        Filesize

        1KB

        MD5

        3cd7ad037efd1fa2a7477031af2c2809

        SHA1

        ec5c179569f1add1f0ea8a69d622b36013ba72ac

        SHA256

        279310c2dfe871f3f6a875ef3d5cfb8922d37faeeb9c127ec312aeebe1c51cd3

        SHA512

        b2349b5a3decd559999f96c5b4886acb9d39ab46562d3dca1ffba049573c7d99980fd9c5272dfbc72059afd89a6d435bc81a2fd0adfb606ad9057c24b6b3f4c8

      • memory/1412-2-0x00007FF970D00000-0x00007FF970D01000-memory.dmp

        Filesize

        4KB

      • memory/2536-325-0x000001C0A04D0000-0x000001C0A04D1000-memory.dmp

        Filesize

        4KB

      • memory/2536-326-0x000001C0A04D0000-0x000001C0A04D1000-memory.dmp

        Filesize

        4KB

      • memory/2536-327-0x000001C0A04D0000-0x000001C0A04D1000-memory.dmp

        Filesize

        4KB

      • memory/2536-333-0x000001C0A04D0000-0x000001C0A04D1000-memory.dmp

        Filesize

        4KB

      • memory/2536-334-0x000001C0A04D0000-0x000001C0A04D1000-memory.dmp

        Filesize

        4KB

      • memory/2536-332-0x000001C0A04D0000-0x000001C0A04D1000-memory.dmp

        Filesize

        4KB

      • memory/2536-331-0x000001C0A04D0000-0x000001C0A04D1000-memory.dmp

        Filesize

        4KB

      • memory/2536-335-0x000001C0A04D0000-0x000001C0A04D1000-memory.dmp

        Filesize

        4KB

      • memory/2536-337-0x000001C0A04D0000-0x000001C0A04D1000-memory.dmp

        Filesize

        4KB

      • memory/2536-336-0x000001C0A04D0000-0x000001C0A04D1000-memory.dmp

        Filesize

        4KB

      • memory/3244-258-0x00007FF971F80000-0x00007FF971F81000-memory.dmp

        Filesize

        4KB

      • memory/3244-259-0x00007FF972920000-0x00007FF972921000-memory.dmp

        Filesize

        4KB