Resubmissions

06-11-2023 13:20

231106-qlacesbc9s 10

17-10-2023 02:20

231017-csxjmsgg7s 7

Analysis

  • max time kernel
    41s
  • max time network
    26s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2023 13:20

General

  • Target

    6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe

  • Size

    5.3MB

  • MD5

    eba4be8ed0e9282976f8ee0b04fb2474

  • SHA1

    f4d698ece0ff6af36c1a2e9108ea475518df0aa7

  • SHA256

    6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e

  • SHA512

    cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b

  • SSDEEP

    98304:g4VEl27OuKr+gvhf2Z9Nzm31PMogNuSZTKA0t9FFPEzlkqXf0FKp806UcR:guXOuK6mq9NzgMoIbk9fcpkSIKpb6UcR

Malware Config

Extracted

Family

milleniumrat

C2

https://api.telegram.org/bot6597086550:AAH-iMklHZd9G4OC7i-qH_lJ-F4S0eEVjPM/sendMessage?chat_id=2024893777

Signatures

  • MilleniumRat

    MilleniumRat is a remote access trojan written in C#.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe
    "C:\Users\Admin\AppData\Local\Temp\6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\Windows\system32\reg.exe
        reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
        3⤵
        • Modifies registry key
        PID:2752
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Windows\system32\reg.exe
        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:2644
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp4EBC.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp4EBC.tmp.bat
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\system32\tasklist.exe
        Tasklist /fi "PID eq 3048"
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:2588
      • C:\Windows\system32\find.exe
        find ":"
        3⤵
          PID:2584
        • C:\Windows\system32\timeout.exe
          Timeout /T 1 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:3036
        • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe
          "C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2384
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2924
            • C:\Windows\system32\reg.exe
              reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
              5⤵
              • Modifies registry key
              PID:2564
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3012
            • C:\Windows\system32\reg.exe
              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
              5⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:1984
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2000
            • C:\Windows\system32\reg.exe
              reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
              5⤵
              • Modifies registry key
              PID:660
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1880
            • C:\Windows\system32\reg.exe
              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
              5⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:112
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 2384 -s 1988
            4⤵
              PID:1480

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sni.dll

        Filesize

        156KB

        MD5

        7f1799b65b98450a19e4d049e9d3e70d

        SHA1

        ec80c5a33374423a9e986c383a36a97da70a3584

        SHA256

        68705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6

        SHA512

        8d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78

      • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sqlite.interop.dll

        Filesize

        1.7MB

        MD5

        65ccd6ecb99899083d43f7c24eb8f869

        SHA1

        27037a9470cc5ed177c0b6688495f3a51996a023

        SHA256

        aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

        SHA512

        533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

      • C:\Users\Admin\AppData\Local\Temp\tmp4EBC.tmp.bat

        Filesize

        332B

        MD5

        f7182fc029549845e7b6af56987906a5

        SHA1

        3cf5aae2bef100420d268d86fe0efc6c0b545ae5

        SHA256

        33334a561cd161753441f963bf56b685ce7ddb8008656203c2a8ac842d880ad0

        SHA512

        1a3ea7ef56d7ed41c5c33728d48817dba5fe8eac719457694fd09c5103e2c3b6a46f66ce15db0301d9591ac1d2e64fedf45667b0c65de2c16c3e44b68a2fa9e2

      • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe

        Filesize

        5.3MB

        MD5

        eba4be8ed0e9282976f8ee0b04fb2474

        SHA1

        f4d698ece0ff6af36c1a2e9108ea475518df0aa7

        SHA256

        6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e

        SHA512

        cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b

      • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe

        Filesize

        5.3MB

        MD5

        eba4be8ed0e9282976f8ee0b04fb2474

        SHA1

        f4d698ece0ff6af36c1a2e9108ea475518df0aa7

        SHA256

        6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e

        SHA512

        cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b

      • \Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sni.dll

        Filesize

        156KB

        MD5

        7f1799b65b98450a19e4d049e9d3e70d

        SHA1

        ec80c5a33374423a9e986c383a36a97da70a3584

        SHA256

        68705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6

        SHA512

        8d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78

      • \Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sni.dll

        Filesize

        156KB

        MD5

        7f1799b65b98450a19e4d049e9d3e70d

        SHA1

        ec80c5a33374423a9e986c383a36a97da70a3584

        SHA256

        68705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6

        SHA512

        8d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78

      • \Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sqlite.interop.dll

        Filesize

        1.7MB

        MD5

        65ccd6ecb99899083d43f7c24eb8f869

        SHA1

        27037a9470cc5ed177c0b6688495f3a51996a023

        SHA256

        aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

        SHA512

        533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

      • \Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sqlite.interop.dll

        Filesize

        1.7MB

        MD5

        65ccd6ecb99899083d43f7c24eb8f869

        SHA1

        27037a9470cc5ed177c0b6688495f3a51996a023

        SHA256

        aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

        SHA512

        533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

      • memory/2384-18-0x000007FEF4960000-0x000007FEF534C000-memory.dmp

        Filesize

        9.9MB

      • memory/2384-17-0x0000000000C40000-0x0000000001190000-memory.dmp

        Filesize

        5.3MB

      • memory/2384-23-0x000000001BC80000-0x000000001BCEA000-memory.dmp

        Filesize

        424KB

      • memory/2384-26-0x000000001ACE0000-0x000000001AD05000-memory.dmp

        Filesize

        148KB

      • memory/2384-35-0x000007FEF4960000-0x000007FEF534C000-memory.dmp

        Filesize

        9.9MB

      • memory/2384-36-0x00000000002B0000-0x0000000000330000-memory.dmp

        Filesize

        512KB

      • memory/2384-37-0x00000000002B0000-0x0000000000330000-memory.dmp

        Filesize

        512KB

      • memory/2384-38-0x000007FEF4960000-0x000007FEF534C000-memory.dmp

        Filesize

        9.9MB

      • memory/3048-0-0x00000000000F0000-0x0000000000640000-memory.dmp

        Filesize

        5.3MB

      • memory/3048-13-0x000007FEF5350000-0x000007FEF5D3C000-memory.dmp

        Filesize

        9.9MB

      • memory/3048-9-0x000000001B2D0000-0x000000001B350000-memory.dmp

        Filesize

        512KB

      • memory/3048-1-0x000007FEF5350000-0x000007FEF5D3C000-memory.dmp

        Filesize

        9.9MB