Analysis
-
max time kernel
105s -
max time network
100s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-12-2024 17:09
General
-
Target
echo.exe
-
Size
6.7MB
-
MD5
7b1e3279d14ac07ea7fb16361afe7f38
-
SHA1
34e4c3684f3cb150ce3123fed90a58d2256811ae
-
SHA256
acb3c5f2dc857bdb2f721d673982981ff99004bb0d5b21801e032fdac00b1615
-
SHA512
fba4de4a6653d4d39a8c7bfe8da4286e952be3828d4f5e6881229adde5b24a3a5f616dbb416d1b00e067a23f7a9afa8a37d71f684361a145e0815ca7c2b9b8c6
-
SSDEEP
98304:gpv87WQRLP1e5dDwG1eFsr7/zPlcGxH0Ig17E3AAy5tx5KD/Swz1TOkKoS:uvWpefDwGcsztcGfcY3gtAL1Ck
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\rteth.sys cmd.exe File opened for modification C:\Windows\System32\drivers\S1DD2L~1.SYS cmd.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 4928 icacls.exe 3232 takeown.exe -
Loads dropped DLL 2 IoCs
pid Process 4356 echo.exe 4356 echo.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3232 takeown.exe 4928 icacls.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\config\SAM.LOG1 cmd.exe File opened for modification C:\Windows\System32\config\TxR\{2FA72~2.REG cmd.exe File opened for modification C:\Windows\System32\mdmpostprocessevaluator.dll cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI08CB~1.EVT cmd.exe File opened for modification C:\Windows\System32\config\SOFTWA~1.LOG cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI3F20~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MIB868~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI5FD1~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MIE386~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI8607~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI4667~1.EVT cmd.exe File opened for modification C:\Windows\System32\catroot2\{F750E~1\catdb cmd.exe File opened for modification C:\Windows\System32\config\SAM cmd.exe File opened for modification C:\Windows\System32\config\SAM.LOG2 cmd.exe File opened for modification C:\Windows\System32\icuuc.dll cmd.exe File opened for modification C:\Windows\System32\wbem\Repository\MAPPING2.MAP cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\HARDWA~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI34FE~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI8248~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI2C28~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI6343~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MIFAE7~1.EVT cmd.exe File opened for modification C:\Windows\System32\config\SYSTEM~1\AppData\Local\MICROS~1\Office\OTele\OFFICE~1.DB- cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI3A4A~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI86D6~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI4D4C~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\OALERT~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI7E7D~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI1E8D~1.EVT cmd.exe File opened for modification C:\Windows\System32\config\SYSTEM~1\AppData\Local\MICROS~1\Windows\WebCache\V01.log cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI03A7~1.EVT cmd.exe File opened for modification C:\Windows\System32\config\SOFTWARE cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI7808~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MICA77~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI8CEE~1.EVT cmd.exe File opened for modification C:\Windows\System32\catroot2\edbtmp.log cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\KEYMAN~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MIA726~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI3B13~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MIDCC7~1.EVT cmd.exe File opened for modification C:\Windows\System32\config\SYSTEM~1\AppData\Local\MICROS~1\Office\OTele\OFFICE~1.DB cmd.exe File opened for modification C:\Windows\System32\config\SYSTEM~1\AppData\Local\MICROS~1\Windows\WEBCAC~1.DAT cmd.exe File opened for modification C:\Windows\System32\spp\store\2.0\tokens.dat cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\INTERN~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI77BB~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MICROS~3.EVT cmd.exe File opened for modification C:\Windows\System32\config\SECURITY cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI483C~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MIFF83~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\SYSTEM~1.EVT cmd.exe File opened for modification C:\Windows\System32\config\SECURITY.LOG1 cmd.exe File opened for modification C:\Windows\System32\config\TxR\{21A4A~1.REG cmd.exe File opened for modification C:\Windows\System32\icu.dll cmd.exe File opened for modification C:\Windows\System32\restore\MACHIN~1.TXT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI8BDF~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MIFC66~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI5B8F~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\SECURI~1.EVT cmd.exe File opened for modification C:\Windows\System32\config\BBI cmd.exe File opened for modification C:\Windows\System32\config\BBI.LOG2 cmd.exe File opened for modification C:\Windows\System32\config\TxR\{2FA72~2.BLF cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MIE21D~1.EVT cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI755E~1.EVT cmd.exe File opened for modification C:\Windows\System32\config\DEFAUL~1.LOG cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3232 takeown.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3152 wrote to memory of 4356 3152 echo.exe 78 PID 3152 wrote to memory of 4356 3152 echo.exe 78 PID 4356 wrote to memory of 3600 4356 echo.exe 79 PID 4356 wrote to memory of 3600 4356 echo.exe 79 PID 3600 wrote to memory of 3232 3600 cmd.exe 80 PID 3600 wrote to memory of 3232 3600 cmd.exe 80 PID 4356 wrote to memory of 3436 4356 echo.exe 81 PID 4356 wrote to memory of 3436 4356 echo.exe 81 PID 3436 wrote to memory of 4928 3436 cmd.exe 82 PID 3436 wrote to memory of 4928 3436 cmd.exe 82 PID 4356 wrote to memory of 2828 4356 echo.exe 83 PID 4356 wrote to memory of 2828 4356 echo.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\echo.exe"C:\Users\Admin\AppData\Local\Temp\echo.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\echo.exe"C:\Users\Admin\AppData\Local\Temp\echo.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "takeown /f C:\Windows\System32 /r /d y"3⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32 /r /d y4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "icacls C:\Windows\System32 /grant administrators:F /t"3⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\system32\icacls.exeicacls C:\Windows\System32 /grant administrators:F /t4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4928
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "rd /s /q C:\Windows\System32"3⤵
- Drops file in Drivers directory
- Drops file in System32 directory
PID:2828
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d
-
Filesize
82KB
MD54438affaaa0ca1df5b9b1cdaa0115ec1
SHA14eda79eaf3de614d5f744aa9eea5bfcf66e2d386
SHA256ec91e2b4baca31b992d016b84b70f110ce2b1b2dfd54f5e5bef6270ed7d13b85
SHA5126992107ac4d2108e477bc81af667b8b8e5439231e7e9f4b15ce4bce1aeea811bc0f1aaa438be3b0e38597760cb504367512809ee1937c4b538a86724ae543ba6
-
Filesize
247KB
MD5be315973aff9bdeb06629cd90e1a901f
SHA1151f98d278e1f1308f2be1788c9f3b950ab88242
SHA2560f9c6cc463611a9b2c692382fe1cdd7a52fea4733ffaf645d433f716f8bbd725
SHA5128ea715438472e9c174dee5ece3c7d9752c31159e2d5796e5229b1df19f87316579352fc3649373db066dc537adf4869198b70b7d4d1d39ac647da2dd7cfc21e8
-
Filesize
63KB
MD51524882af71247adecf5815a4e55366a
SHA1e25014c793c53503bdff9af046140edda329d01b
SHA2566f7742dfdd371c39048d775f37df3bc2d8d4316c9008e62347b337d64ebed327
SHA5125b954bb7953f19aa6f7c65ad3f105b77d37077950fb1b50d9d8d337bdd4b95343bac2f4c9fe17a02d1738d1f87eeef73dbbf5cdddcb470588cbc5a63845b188a
-
Filesize
155KB
MD5737119a80303ef4eccaa998d500e7640
SHA1328c67c6c4d297ac13da725bf24467d8b5e982e3
SHA2567158c1290ac29169160b3ec94d9c8bcde4012d67a555f325d44b418c54e2cc28
SHA5121c9920e0841a65b01a0b339c5f5254d1039ef9a16fe0c2484a7e2a9048727f2cc081817aa771b0c574fb8d1a5a49dc39798a3c5e5b5e64392e9c168e1827be7c
-
Filesize
77KB
MD564a6c475f59e5c57b3f4dd935f429f09
SHA1ca2e0719dc32f22163ae0e7b53b2caadb0b9d023
SHA256d03fa645cde89b4b01f4a2577139fbb7e1392cb91dc26213b3b76419110d8e49
SHA512cf9e03b7b34cc095fe05c465f9d794319aaa0428fe30ab4ddce14ba78e835edf228d11ec016fd31dfe9f09d84b6f73482fb8e0f574d1fd08943c1ec9e0584973
-
Filesize
1.4MB
MD5d900650a59899d8e54982ce705883f07
SHA1d0778376cbf84d270419a748268f123e6b73ed3d
SHA2567bd59461ad10f9695230d7e65cc7b81c2d9b1a269982240f128a24c56ad30a99
SHA5121b13ea45a0603bf8cb0c7f013704f8d414decb02eb3bbe9263b7d0c3fbcb67bb767faf934fc4e64f1dc94c6597b58d6cf0b7e2e7d3c72f0e9ddf8f9f9dcab405
-
Filesize
4.9MB
MD57a6a8c2a8c379b111cdceb66b18d687d
SHA1f3b8a4c731fa0145f224112f91f046fddf642794
SHA2568e13b53ee25825b97f191d77b51ed03966f8b435773fa3fbc36f3eb668fc569b
SHA512f2ef1702df861ef55ef397ad69985d62b675d348cab3862f6ca761f1ce3ee896f663a77d7b69b286be64e7c69be1215b03945781450b186fc02cfb1e4cb226b5
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081
-
Filesize
29KB
MD5653bdccb7af2aa9ccf50cb050fd3be64
SHA1afe0a85425ae911694c250ab4cb1f6c3d3f2cc69
SHA256e24a3e7885df9a18c29ba058c49c3adcf59e4b58107847b98eca365b6d94f279
SHA51207e841fda7a2295380bfa05db7a4699f18c6e639da91d8ee2d126d4f96e4cddaedbd490deb4d2a2e8e5877edfff877693f67a9dc487e29742943e062d7be6277
-
Filesize
1.1MB
MD51905b5d0f945499441e8cd58eb123d86
SHA1117e584e6fcc0e8cfc8e24e3af527999f14bac30
SHA256b1788b81fa160e5120451f9252c7745cdde98b8ce59bf273a3dd867bb034c532
SHA512ed88cd7e3259239a0c8d42d95fa2447fc454a944c849fa97449ad88871236fefdafe21dbfa6e9b5d8a54ddf1d5281ec34d314cb93d47ce7b13912a69d284f522