Analysis

  • max time kernel
    336s
  • max time network
    354s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2023 10:12

General

  • Target

    6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe

  • Size

    5.3MB

  • MD5

    eba4be8ed0e9282976f8ee0b04fb2474

  • SHA1

    f4d698ece0ff6af36c1a2e9108ea475518df0aa7

  • SHA256

    6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e

  • SHA512

    cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b

  • SSDEEP

    98304:g4VEl27OuKr+gvhf2Z9Nzm31PMogNuSZTKA0t9FFPEzlkqXf0FKp806UcR:guXOuK6mq9NzgMoIbk9fcpkSIKpb6UcR

Malware Config

Extracted

Family

milleniumrat

C2

https://api.telegram.org/bot6597086550:AAH-iMklHZd9G4OC7i-qH_lJ-F4S0eEVjPM/sendMessage?chat_id=2024893777

Signatures

  • MilleniumRat

    MilleniumRat is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe
    "C:\Users\Admin\AppData\Local\Temp\6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3420
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Windows\system32\reg.exe
        reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
        3⤵
        • Modifies registry key
        PID:3896
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3608
      • C:\Windows\system32\reg.exe
        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:2944
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpC21D.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpC21D.tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4332
      • C:\Windows\system32\tasklist.exe
        Tasklist /fi "PID eq 3420"
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:4932
      • C:\Windows\system32\find.exe
        find ":"
        3⤵
          PID:1564
        • C:\Windows\system32\timeout.exe
          Timeout /T 1 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:2584
        • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe
          "C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4244
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:732
            • C:\Windows\system32\reg.exe
              reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
              5⤵
              • Modifies registry key
              PID:332
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1736
            • C:\Windows\system32\reg.exe
              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
              5⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:4600
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3916
            • C:\Windows\system32\reg.exe
              reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
              5⤵
              • Modifies registry key
              PID:1132
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3536
            • C:\Windows\system32\reg.exe
              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
              5⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:1944

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sni.dll

      Filesize

      156KB

      MD5

      7f1799b65b98450a19e4d049e9d3e70d

      SHA1

      ec80c5a33374423a9e986c383a36a97da70a3584

      SHA256

      68705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6

      SHA512

      8d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78

    • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sni.dll

      Filesize

      156KB

      MD5

      7f1799b65b98450a19e4d049e9d3e70d

      SHA1

      ec80c5a33374423a9e986c383a36a97da70a3584

      SHA256

      68705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6

      SHA512

      8d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78

    • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sni.dll

      Filesize

      156KB

      MD5

      7f1799b65b98450a19e4d049e9d3e70d

      SHA1

      ec80c5a33374423a9e986c383a36a97da70a3584

      SHA256

      68705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6

      SHA512

      8d67297c5cded487c88fcaad5a36e80926dad8f1863e38f397751056f51258ac7b5a9e5c09c01bba7a224f38fb2ee719586faf0ba81516e05a19649eb09e7b78

    • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sqlite.interop.dll

      Filesize

      1.7MB

      MD5

      65ccd6ecb99899083d43f7c24eb8f869

      SHA1

      27037a9470cc5ed177c0b6688495f3a51996a023

      SHA256

      aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

      SHA512

      533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

    • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sqlite.interop.dll

      Filesize

      1.7MB

      MD5

      65ccd6ecb99899083d43f7c24eb8f869

      SHA1

      27037a9470cc5ed177c0b6688495f3a51996a023

      SHA256

      aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

      SHA512

      533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

    • C:\Users\Admin\AppData\Local\Temp\Costura\FA5FCDD5F58DD12E4C4C86CEAB16005F\64\sqlite.interop.dll

      Filesize

      1.7MB

      MD5

      65ccd6ecb99899083d43f7c24eb8f869

      SHA1

      27037a9470cc5ed177c0b6688495f3a51996a023

      SHA256

      aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

      SHA512

      533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

    • C:\Users\Admin\AppData\Local\Temp\tmpC21D.tmp.bat

      Filesize

      332B

      MD5

      88bbcbc25fe8648a81e31c0ef3e6ad41

      SHA1

      81688c37e1071bd9b735a14ef66236246254f5e0

      SHA256

      d3d66ac429c82e875e00dad188132d169835c9d1470c2172096941243f84dc41

      SHA512

      223b10e0dd7fd33d4cb1f6079388e12a5ec195069ef6e4d90742ab83d01fc073b07ff971be980af1140df75c5021f4be533fa8e184ced705ddcedd37d7c8a40d

    • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe

      Filesize

      5.3MB

      MD5

      eba4be8ed0e9282976f8ee0b04fb2474

      SHA1

      f4d698ece0ff6af36c1a2e9108ea475518df0aa7

      SHA256

      6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e

      SHA512

      cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b

    • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe

      Filesize

      5.3MB

      MD5

      eba4be8ed0e9282976f8ee0b04fb2474

      SHA1

      f4d698ece0ff6af36c1a2e9108ea475518df0aa7

      SHA256

      6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e

      SHA512

      cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b

    • memory/3420-11-0x000001776BA30000-0x000001776BA4E000-memory.dmp

      Filesize

      120KB

    • memory/3420-8-0x00007FF94E960000-0x00007FF94F421000-memory.dmp

      Filesize

      10.8MB

    • memory/3420-13-0x000001776C500000-0x000001776C510000-memory.dmp

      Filesize

      64KB

    • memory/3420-12-0x00007FF94E960000-0x00007FF94F421000-memory.dmp

      Filesize

      10.8MB

    • memory/3420-17-0x00007FF94E960000-0x00007FF94F421000-memory.dmp

      Filesize

      10.8MB

    • memory/3420-0-0x00000177698F0000-0x0000017769E40000-memory.dmp

      Filesize

      5.3MB

    • memory/3420-10-0x000001776C500000-0x000001776C510000-memory.dmp

      Filesize

      64KB

    • memory/3420-9-0x000001776C260000-0x000001776C2D6000-memory.dmp

      Filesize

      472KB

    • memory/4244-27-0x000001EDCB970000-0x000001EDCB980000-memory.dmp

      Filesize

      64KB

    • memory/4244-22-0x00007FF94E960000-0x00007FF94F421000-memory.dmp

      Filesize

      10.8MB

    • memory/4244-28-0x000001EDCB760000-0x000001EDCB76A000-memory.dmp

      Filesize

      40KB

    • memory/4244-29-0x000001EDCC5D0000-0x000001EDCC63A000-memory.dmp

      Filesize

      424KB

    • memory/4244-31-0x00007FF94E960000-0x00007FF94F421000-memory.dmp

      Filesize

      10.8MB

    • memory/4244-33-0x000001EDCC680000-0x000001EDCC6BA000-memory.dmp

      Filesize

      232KB

    • memory/4244-34-0x000001EDCC640000-0x000001EDCC666000-memory.dmp

      Filesize

      152KB

    • memory/4244-52-0x000001EDCC6E0000-0x000001EDCC6F2000-memory.dmp

      Filesize

      72KB

    • memory/4244-55-0x000001EDCB970000-0x000001EDCB980000-memory.dmp

      Filesize

      64KB

    • memory/4244-57-0x000001EDCB970000-0x000001EDCB980000-memory.dmp

      Filesize

      64KB