Resubmissions

06-11-2023 13:20

231106-qlacesbc9s 10

17-10-2023 02:20

231017-csxjmsgg7s 7

Analysis

  • max time kernel
    410s
  • max time network
    426s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2023 13:20

General

  • Target

    6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe

  • Size

    5.3MB

  • MD5

    eba4be8ed0e9282976f8ee0b04fb2474

  • SHA1

    f4d698ece0ff6af36c1a2e9108ea475518df0aa7

  • SHA256

    6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e

  • SHA512

    cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b

  • SSDEEP

    98304:g4VEl27OuKr+gvhf2Z9Nzm31PMogNuSZTKA0t9FFPEzlkqXf0FKp806UcR:guXOuK6mq9NzgMoIbk9fcpkSIKpb6UcR

Malware Config

Extracted

Family

milleniumrat

C2

https://api.telegram.org/bot6597086550:AAH-iMklHZd9G4OC7i-qH_lJ-F4S0eEVjPM/sendMessage?chat_id=2024893777

Signatures

  • MilleniumRat

    MilleniumRat is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe
    "C:\Users\Admin\AppData\Local\Temp\6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3300
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3992
      • C:\Windows\system32\reg.exe
        reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
        3⤵
        • Modifies registry key
        PID:4256
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Windows\system32\reg.exe
        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:5116
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpAD8.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpAD8.tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2512
      • C:\Windows\system32\tasklist.exe
        Tasklist /fi "PID eq 3300"
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:1088
      • C:\Windows\system32\find.exe
        find ":"
        3⤵
          PID:404
        • C:\Windows\system32\timeout.exe
          Timeout /T 1 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:2452
        • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe
          "C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4240
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4516
            • C:\Windows\system32\reg.exe
              reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
              5⤵
              • Modifies registry key
              PID:2404
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3100
            • C:\Windows\system32\reg.exe
              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
              5⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:1484
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1196
            • C:\Windows\system32\reg.exe
              reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
              5⤵
              • Modifies registry key
              PID:3380
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1316
            • C:\Windows\system32\reg.exe
              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
              5⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:4388

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sni.dll

      Filesize

      156KB

      MD5

      7f1799b65b98450a19e4d049e9d3e70d

      SHA1

      ec80c5a33374423a9e986c383a36a97da70a3584

      SHA256

      68705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6

      SHA512

      8d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78

    • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sni.dll

      Filesize

      156KB

      MD5

      7f1799b65b98450a19e4d049e9d3e70d

      SHA1

      ec80c5a33374423a9e986c383a36a97da70a3584

      SHA256

      68705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6

      SHA512

      8d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78

    • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sni.dll

      Filesize

      156KB

      MD5

      7f1799b65b98450a19e4d049e9d3e70d

      SHA1

      ec80c5a33374423a9e986c383a36a97da70a3584

      SHA256

      68705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6

      SHA512

      8d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78

    • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sqlite.interop.dll

      Filesize

      1.7MB

      MD5

      65ccd6ecb99899083d43f7c24eb8f869

      SHA1

      27037a9470cc5ed177c0b6688495f3a51996a023

      SHA256

      aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

      SHA512

      533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

    • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sqlite.interop.dll

      Filesize

      1.7MB

      MD5

      65ccd6ecb99899083d43f7c24eb8f869

      SHA1

      27037a9470cc5ed177c0b6688495f3a51996a023

      SHA256

      aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

      SHA512

      533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

    • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sqlite.interop.dll

      Filesize

      1.7MB

      MD5

      65ccd6ecb99899083d43f7c24eb8f869

      SHA1

      27037a9470cc5ed177c0b6688495f3a51996a023

      SHA256

      aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

      SHA512

      533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

    • C:\Users\Admin\AppData\Local\Temp\tmpAD8.tmp.bat

      Filesize

      332B

      MD5

      1f691f360e41a2ca6a7532d3c539c82d

      SHA1

      e7d8f1ef13bd8fc48d03a29846b201af5a503986

      SHA256

      23b3713997641a349e0fb9e0a4c38071f32b1dd1a2f48ee20b9117d3ad621f71

      SHA512

      13b8ca3cc03b5cf00adae496e5a51d54511afbd26fd348b31a10251f18c83dc8d695beb0ce825bde0211aa6cc082d0519d461bbdf736ac73107f6403e213e15d

    • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe

      Filesize

      5.3MB

      MD5

      eba4be8ed0e9282976f8ee0b04fb2474

      SHA1

      f4d698ece0ff6af36c1a2e9108ea475518df0aa7

      SHA256

      6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e

      SHA512

      cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b

    • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe

      Filesize

      5.3MB

      MD5

      eba4be8ed0e9282976f8ee0b04fb2474

      SHA1

      f4d698ece0ff6af36c1a2e9108ea475518df0aa7

      SHA256

      6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e

      SHA512

      cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b

    • memory/3300-11-0x000001E079310000-0x000001E07932E000-memory.dmp

      Filesize

      120KB

    • memory/3300-5-0x00007FFE1EAB0000-0x00007FFE1F571000-memory.dmp

      Filesize

      10.8MB

    • memory/3300-15-0x00007FFE1EAB0000-0x00007FFE1F571000-memory.dmp

      Filesize

      10.8MB

    • memory/3300-0-0x000001E0789A0000-0x000001E078EF0000-memory.dmp

      Filesize

      5.3MB

    • memory/3300-10-0x000001E07B6D0000-0x000001E07B6E0000-memory.dmp

      Filesize

      64KB

    • memory/3300-9-0x000001E07B3D0000-0x000001E07B446000-memory.dmp

      Filesize

      472KB

    • memory/4240-27-0x00000170D2400000-0x00000170D246A000-memory.dmp

      Filesize

      424KB

    • memory/4240-25-0x00000170B74F0000-0x00000170B7500000-memory.dmp

      Filesize

      64KB

    • memory/4240-26-0x00000170B8DA0000-0x00000170B8DAA000-memory.dmp

      Filesize

      40KB

    • memory/4240-20-0x00007FFE1E760000-0x00007FFE1F221000-memory.dmp

      Filesize

      10.8MB

    • memory/4240-30-0x00000170D24F0000-0x00000170D252A000-memory.dmp

      Filesize

      232KB

    • memory/4240-31-0x00000170B8D70000-0x00000170B8D96000-memory.dmp

      Filesize

      152KB

    • memory/4240-49-0x00000170D2530000-0x00000170D2542000-memory.dmp

      Filesize

      72KB

    • memory/4240-52-0x00000170B74F0000-0x00000170B7500000-memory.dmp

      Filesize

      64KB

    • memory/4240-54-0x00007FFE1E760000-0x00007FFE1F221000-memory.dmp

      Filesize

      10.8MB

    • memory/4240-55-0x00000170B74F0000-0x00000170B7500000-memory.dmp

      Filesize

      64KB

    • memory/4240-56-0x00000170B74F0000-0x00000170B7500000-memory.dmp

      Filesize

      64KB

    • memory/4240-57-0x00007FFE1E760000-0x00007FFE1F221000-memory.dmp

      Filesize

      10.8MB