Analysis

  • max time kernel
    128s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-02-2025 13:14

General

  • Target

    EchonexMeets.exe

  • Size

    5.2MB

  • MD5

    521706693511fdecdb0d9052a50ae5fc

  • SHA1

    94214094c8c7c16fb4afc0947a47a386366f4e81

  • SHA256

    b1fa0c62e07f9ad0a625fd1474a197c1d687b985714c3d697981f5fbe4993266

  • SHA512

    ea9608a78e1363b73174c2a3a0732e98fca9e358949e64bfdd7d4dcd9c0a6ccdc2214033dc59cb2c658cc364c172e791233654b3ecf6a1e0cf351b16749f9b74

  • SSDEEP

    98304:PE+JqHlyDS/KzOYH8t9WB2XPzvSXIXf/a+dab7jgOnXTzKqCUvsARxefha5:PE+JqHlyDSixHM9WB4zEHhnXTetUTeC

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Blocklisted process makes network request 7 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\EchonexMeets.exe
    "C:\Users\Admin\AppData\Local\Temp\EchonexMeets.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Echonex Limited\Echonex Meets 7.4.3\install\B57F050\EchonexMeetsRedist.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\EchonexMeets.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1739970636 "
      2⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:2204
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:308
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C78E24A7C9DC34038C33A3E9F39FC0FC C
      2⤵
      • Downloads MZ/PE file
      • Loads dropped DLL
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      PID:1992
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 308 -s 900
      2⤵
        PID:2112
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
        PID:3064
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
          PID:2384

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C5C8CC0A7FE31816B4641D0465402560

          Filesize

          1KB

          MD5

          e94fb54871208c00df70f708ac47085b

          SHA1

          4efc31460c619ecae59c1bce2c008036d94c84b8

          SHA256

          7b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df86

          SHA512

          2e15b76e16264abb9f5ef417752a1cbb75f29c11f96ac7d73793172bd0864db65f2d2b7be0f16bbbe686068f0c368815525f1e39db5a0d6ca3ab18be6923b898

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e2124bd5e1f40dc039ef1dd7395d713a

          SHA1

          356ac3d703e120b7594e6014f6d6ad9ee0114598

          SHA256

          541967e5c657dcfbd02b227b106c14448fbde38c7aba0771fcb289a516f317e5

          SHA512

          b05ea37541d9276c7e60db703ba02efeb1e373ad8fb205bf4a586824f36da90050b7ef838da31bf86624225d7fa49bf4b83ccb29fc55dc32eec3613ad70cfebc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6c6c011fef728f503a18d86667e8e73a

          SHA1

          5c1a49392b308a1668210bc49417063a61bb4a83

          SHA256

          fb4094297b4d8850d83c19330ab5139b052357dbeb44b7722143d2b28bc6c898

          SHA512

          879ebe43c71fe9b68bed1ce7a412d094a0ed5761fd20a7c2562cf072e76b6cff4edea1e6e3e1524f41546fe2d45e9e2e3e426c5b1b6014cafc638b9ecbb8375a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5C8CC0A7FE31816B4641D0465402560

          Filesize

          264B

          MD5

          23ff54d97b1d1232c735cfc42ca7ddf9

          SHA1

          13a8fd250d8b94e3ec3bcf23ad8dfc22ff10c9ed

          SHA256

          d5a968c498c36e9dd67f7d63dfbc6f0f43dd98e89ffb195a155f49837315fc06

          SHA512

          44ba44630f992323b9d4381eaefbcbe68e5145ff12effd26109b4148cc967bceef45fb1d2c3ade41c8e13dec939cdce0a75a6b707159a398aa97b7f4da88c540

        • C:\Users\Admin\AppData\Local\Temp\Cab85A6.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\MSI88A3.tmp

          Filesize

          1005KB

          MD5

          0606e1a2fe0d72593405cafeb945c740

          SHA1

          641e8cfea8d2203d3127b49939b1ed5f1c97dc9e

          SHA256

          7b3a4e3e3f58fa49164d49b14bc10c13a9d734846956c8a7a433c8bb6c82d983

          SHA512

          696152be48a1256c5eda545b8759671117a7b55e49723b437b6ee258a3b568b9440f1592e4abf4eb1aa878e960cc721bdbc55f2a48d77bb1b3315b75cc15946a

        • C:\Users\Admin\AppData\Local\Temp\MSI8920.tmp

          Filesize

          894KB

          MD5

          713c5d0c1b98583f3638212f91f9b99e

          SHA1

          2845ae2516d94e05c8ae305b2f83a452a7e10117

          SHA256

          1a42e41b6c284aeb55d9ac8a28bc7fb50b98008d6a04464d73ebe8d200662ce0

          SHA512

          1cdfd877a950733a12506002a885364842883adfc589c6fb6d06b894848e256b017308dd0939523a82497e7f1b33e6552f0bd5b469727f7fc0290a3eb3915d76

        • C:\Users\Admin\AppData\Local\Temp\Tar8693.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Roaming\Echonex Limited\Echonex Meets 7.4.3\install\B57F050\EchonexMeetsRedist.msi

          Filesize

          4.4MB

          MD5

          3ed69057e89c33a66e3864ee4b508006

          SHA1

          1a8b887612d766cc1cb0e5228d9525690a70bfaa

          SHA256

          5ed795b676b9af0246622fc7758868632797618759451ab279f9dc52228529b9

          SHA512

          60066eb9595e73815aab8d237b76b3502698d1c893ca6a2202102376a62466bfbf59a8c65773c2a362a69c52432898d1849bd7896aa3c02016a53aceda8ccffe

        • memory/2504-0-0x00000000002D0000-0x00000000002D1000-memory.dmp

          Filesize

          4KB

        • memory/2504-249-0x00000000002D0000-0x00000000002D1000-memory.dmp

          Filesize

          4KB