Analysis

  • max time kernel
    152s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 23:32

General

  • Target

    2020b5ab5a4a51c440fda716fe911245.exe

  • Size

    487KB

  • MD5

    2020b5ab5a4a51c440fda716fe911245

  • SHA1

    910c20a92e2f17db95a78d00629e8ed3fa542cc6

  • SHA256

    4d5c26a3f902b1e664d982f31505eacbaae391e33cf76ea905af2886cf9e96c1

  • SHA512

    c28e51a4d4549c8ebe5a451245c00a5d376c06921e430c7cda9261ec46bb1d33d171297676de7a5d5023f963aa82b15e5a7938dee267af8fc53d3c312d2c8a29

  • SSDEEP

    6144:Y6N9NPe+yIDFOHaWWFGYWWztHT3+cBIs6O30gk0TTLvgOkXdhFg:/N/Pt/FSPYWcdb6Ok90TPvgO8hFg

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2020b5ab5a4a51c440fda716fe911245.exe
    "C:\Users\Admin\AppData\Local\Temp\2020b5ab5a4a51c440fda716fe911245.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c type "C:\Users\Admin\AppData\Local\Temp\2020b5ab5a4a51c440fda716fe911245.exe" > "C:\Users\Admin\AppData\Local\Route0\route.exe"
      2⤵
        PID:1692
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c type "C:\Users\Admin\AppData\Local\Temp\2020b5ab5a4a51c440fda716fe911245.exe" > "C:\Users\Admin\AppData\Local\Route0\zroute.exe"
        2⤵
          PID:2532
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c pushd C:\Users\Admin\AppData\Local\Route0 & start route.exe & popd
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2676
          • C:\Users\Admin\AppData\Local\Route0\route.exe
            route.exe
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2592
            • C:\Users\Admin\AppData\Local\Route0\zroute.exe
              C:\Users\Admin\AppData\Local\Route0\zroute.exe --c
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2212
            • C:\Users\Admin\AppData\Local\Route0\zroute.exe
              C:\Users\Admin\AppData\Local\Route0\zroute.exe --cs
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1096
            • C:\Users\Admin\AppData\Local\Route0\zroute.exe
              C:\Users\Admin\AppData\Local\Route0\zroute.exe --w
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1060
            • C:\Users\Admin\AppData\Local\Route0\zroute.exe
              C:\Users\Admin\AppData\Local\Route0\zroute.exe --p
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2504
            • C:\Users\Admin\AppData\Local\Route0\zroute.exe
              C:\Users\Admin\AppData\Local\Route0\zroute.exe --b
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2900
            • C:\Users\Admin\AppData\Local\Route0\zroute.exe
              C:\Users\Admin\AppData\Local\Route0\zroute.exe --b
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2060

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Route0\brt.pie

        Filesize

        2B

        MD5

        81051bcc2cf1bedf378224b0a93e2877

        SHA1

        ba8ab5a0280b953aa97435ff8946cbcbb2755a27

        SHA256

        7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

        SHA512

        1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

      • C:\Users\Admin\AppData\Local\Route0\log.dat

        Filesize

        17B

        MD5

        66066e21e21796c0aad666f3be52881e

        SHA1

        78fc91278fa109c8643f7989fb10d2e1162b24a7

        SHA256

        80327c853d68b334f1c972a4d83ce6bb981a15a465149e2609d3195e7700c9bc

        SHA512

        4fcce33079cb24adf01c5d800f4bd44fb7a9a289fca01a2fe9d464df76f8e18cf1149446dbe21dba961342b938cb5633844663e36d84db2e867f567ce1fc04ce

      • C:\Users\Admin\AppData\Local\Temp\CabACD5.tmp

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\TarAD16.tmp

        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • \Users\Admin\AppData\Local\Route0\route.exe

        Filesize

        487KB

        MD5

        2020b5ab5a4a51c440fda716fe911245

        SHA1

        910c20a92e2f17db95a78d00629e8ed3fa542cc6

        SHA256

        4d5c26a3f902b1e664d982f31505eacbaae391e33cf76ea905af2886cf9e96c1

        SHA512

        c28e51a4d4549c8ebe5a451245c00a5d376c06921e430c7cda9261ec46bb1d33d171297676de7a5d5023f963aa82b15e5a7938dee267af8fc53d3c312d2c8a29

      • memory/1060-51-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/1060-61-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/1060-55-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/1060-63-0x0000000000D20000-0x0000000000E20000-memory.dmp

        Filesize

        1024KB

      • memory/1060-77-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/1060-49-0x0000000000D20000-0x0000000000E20000-memory.dmp

        Filesize

        1024KB

      • memory/1096-41-0x0000000000DA0000-0x0000000000EA0000-memory.dmp

        Filesize

        1024KB

      • memory/1096-54-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/1096-58-0x0000000000DA0000-0x0000000000EA0000-memory.dmp

        Filesize

        1024KB

      • memory/1096-42-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/1948-6-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/1948-2-0x0000000000220000-0x0000000000289000-memory.dmp

        Filesize

        420KB

      • memory/1948-4-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/1948-24-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/1948-1-0x0000000000DF0000-0x0000000000EF0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-21-0x0000000000DF0000-0x0000000000EF0000-memory.dmp

        Filesize

        1024KB

      • memory/1948-20-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/2060-153-0x00000000002F0000-0x00000000003F0000-memory.dmp

        Filesize

        1024KB

      • memory/2060-154-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/2212-53-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/2212-57-0x0000000000CF0000-0x0000000000DF0000-memory.dmp

        Filesize

        1024KB

      • memory/2212-39-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/2212-35-0x0000000000CF0000-0x0000000000DF0000-memory.dmp

        Filesize

        1024KB

      • memory/2504-120-0x0000000000270000-0x0000000000370000-memory.dmp

        Filesize

        1024KB

      • memory/2504-70-0x0000000000270000-0x0000000000370000-memory.dmp

        Filesize

        1024KB

      • memory/2504-71-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/2504-114-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/2592-18-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/2592-22-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/2592-26-0x0000000000CF0000-0x0000000000DF0000-memory.dmp

        Filesize

        1024KB

      • memory/2592-52-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/2592-16-0x0000000000330000-0x0000000000399000-memory.dmp

        Filesize

        420KB

      • memory/2592-15-0x0000000000CF0000-0x0000000000DF0000-memory.dmp

        Filesize

        1024KB

      • memory/2900-130-0x0000000000250000-0x0000000000350000-memory.dmp

        Filesize

        1024KB

      • memory/2900-131-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/2900-136-0x0000000000400000-0x0000000000C55000-memory.dmp

        Filesize

        8.3MB

      • memory/2900-142-0x0000000000250000-0x0000000000350000-memory.dmp

        Filesize

        1024KB