Analysis
-
max time kernel
41s -
max time network
26s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
06-11-2023 13:20
Behavioral task
behavioral1
Sample
6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe
Resource
win10v2004-20231023-en
General
-
Target
6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe
-
Size
5.3MB
-
MD5
eba4be8ed0e9282976f8ee0b04fb2474
-
SHA1
f4d698ece0ff6af36c1a2e9108ea475518df0aa7
-
SHA256
6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e
-
SHA512
cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b
-
SSDEEP
98304:g4VEl27OuKr+gvhf2Z9Nzm31PMogNuSZTKA0t9FFPEzlkqXf0FKp806UcR:guXOuK6mq9NzgMoIbk9fcpkSIKpb6UcR
Malware Config
Extracted
milleniumrat
https://api.telegram.org/bot6597086550:AAH-iMklHZd9G4OC7i-qH_lJ-F4S0eEVjPM/sendMessage?chat_id=2024893777
Signatures
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Deletes itself 1 IoCs
pid Process 2704 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2384 Update.exe -
Loads dropped DLL 4 IoCs
pid Process 3048 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3048 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 2384 Update.exe 2384 Update.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3036 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2588 tasklist.exe -
Modifies registry key 1 TTPs 6 IoCs
pid Process 2644 reg.exe 2564 reg.exe 1984 reg.exe 112 reg.exe 660 reg.exe 2752 reg.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3048 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3048 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 3048 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 2384 Update.exe 2384 Update.exe 2384 Update.exe 2384 Update.exe 2384 Update.exe 2384 Update.exe 2384 Update.exe 2384 Update.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3048 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe Token: SeDebugPrivilege 2588 tasklist.exe Token: SeDebugPrivilege 2384 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2384 Update.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2212 3048 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 29 PID 3048 wrote to memory of 2212 3048 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 29 PID 3048 wrote to memory of 2212 3048 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 29 PID 3048 wrote to memory of 2148 3048 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 31 PID 3048 wrote to memory of 2148 3048 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 31 PID 3048 wrote to memory of 2148 3048 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 31 PID 3048 wrote to memory of 2704 3048 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 32 PID 3048 wrote to memory of 2704 3048 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 32 PID 3048 wrote to memory of 2704 3048 6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe 32 PID 2212 wrote to memory of 2752 2212 cmd.exe 35 PID 2212 wrote to memory of 2752 2212 cmd.exe 35 PID 2212 wrote to memory of 2752 2212 cmd.exe 35 PID 2148 wrote to memory of 2644 2148 cmd.exe 36 PID 2148 wrote to memory of 2644 2148 cmd.exe 36 PID 2148 wrote to memory of 2644 2148 cmd.exe 36 PID 2704 wrote to memory of 2588 2704 cmd.exe 37 PID 2704 wrote to memory of 2588 2704 cmd.exe 37 PID 2704 wrote to memory of 2588 2704 cmd.exe 37 PID 2704 wrote to memory of 2584 2704 cmd.exe 38 PID 2704 wrote to memory of 2584 2704 cmd.exe 38 PID 2704 wrote to memory of 2584 2704 cmd.exe 38 PID 2704 wrote to memory of 3036 2704 cmd.exe 39 PID 2704 wrote to memory of 3036 2704 cmd.exe 39 PID 2704 wrote to memory of 3036 2704 cmd.exe 39 PID 2704 wrote to memory of 2384 2704 cmd.exe 40 PID 2704 wrote to memory of 2384 2704 cmd.exe 40 PID 2704 wrote to memory of 2384 2704 cmd.exe 40 PID 2384 wrote to memory of 2924 2384 Update.exe 41 PID 2384 wrote to memory of 2924 2384 Update.exe 41 PID 2384 wrote to memory of 2924 2384 Update.exe 41 PID 2384 wrote to memory of 3012 2384 Update.exe 43 PID 2384 wrote to memory of 3012 2384 Update.exe 43 PID 2384 wrote to memory of 3012 2384 Update.exe 43 PID 2924 wrote to memory of 2564 2924 cmd.exe 45 PID 2924 wrote to memory of 2564 2924 cmd.exe 45 PID 2924 wrote to memory of 2564 2924 cmd.exe 45 PID 3012 wrote to memory of 1984 3012 cmd.exe 46 PID 3012 wrote to memory of 1984 3012 cmd.exe 46 PID 3012 wrote to memory of 1984 3012 cmd.exe 46 PID 2384 wrote to memory of 2000 2384 Update.exe 47 PID 2384 wrote to memory of 2000 2384 Update.exe 47 PID 2384 wrote to memory of 2000 2384 Update.exe 47 PID 2384 wrote to memory of 1880 2384 Update.exe 48 PID 2384 wrote to memory of 1880 2384 Update.exe 48 PID 2384 wrote to memory of 1880 2384 Update.exe 48 PID 1880 wrote to memory of 112 1880 cmd.exe 51 PID 1880 wrote to memory of 112 1880 cmd.exe 51 PID 1880 wrote to memory of 112 1880 cmd.exe 51 PID 2000 wrote to memory of 660 2000 cmd.exe 52 PID 2000 wrote to memory of 660 2000 cmd.exe 52 PID 2000 wrote to memory of 660 2000 cmd.exe 52 PID 2384 wrote to memory of 1480 2384 Update.exe 53 PID 2384 wrote to memory of 1480 2384 Update.exe 53 PID 2384 wrote to memory of 1480 2384 Update.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe"C:\Users\Admin\AppData\Local\Temp\6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f2⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f3⤵
- Modifies registry key
PID:2752
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2644
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp4EBC.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp4EBC.tmp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3048"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2584
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:3036
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f4⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\system32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f5⤵
- Modifies registry key
PID:2564
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f4⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:1984
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f4⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f5⤵
- Modifies registry key
PID:660
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f4⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:112
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2384 -s 19884⤵PID:1480
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD57f1799b65b98450a19e4d049e9d3e70d
SHA1ec80c5a33374423a9e986c383a36a97da70a3584
SHA25668705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6
SHA5128d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
332B
MD5f7182fc029549845e7b6af56987906a5
SHA13cf5aae2bef100420d268d86fe0efc6c0b545ae5
SHA25633334a561cd161753441f963bf56b685ce7ddb8008656203c2a8ac842d880ad0
SHA5121a3ea7ef56d7ed41c5c33728d48817dba5fe8eac719457694fd09c5103e2c3b6a46f66ce15db0301d9591ac1d2e64fedf45667b0c65de2c16c3e44b68a2fa9e2
-
Filesize
5.3MB
MD5eba4be8ed0e9282976f8ee0b04fb2474
SHA1f4d698ece0ff6af36c1a2e9108ea475518df0aa7
SHA2566d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e
SHA512cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b
-
Filesize
5.3MB
MD5eba4be8ed0e9282976f8ee0b04fb2474
SHA1f4d698ece0ff6af36c1a2e9108ea475518df0aa7
SHA2566d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e
SHA512cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b
-
Filesize
156KB
MD57f1799b65b98450a19e4d049e9d3e70d
SHA1ec80c5a33374423a9e986c383a36a97da70a3584
SHA25668705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6
SHA5128d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78
-
Filesize
156KB
MD57f1799b65b98450a19e4d049e9d3e70d
SHA1ec80c5a33374423a9e986c383a36a97da70a3584
SHA25668705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6
SHA5128d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d