Analysis
-
max time kernel
152s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
2020b5ab5a4a51c440fda716fe911245.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2020b5ab5a4a51c440fda716fe911245.exe
Resource
win10v2004-20231215-en
General
-
Target
2020b5ab5a4a51c440fda716fe911245.exe
-
Size
487KB
-
MD5
2020b5ab5a4a51c440fda716fe911245
-
SHA1
910c20a92e2f17db95a78d00629e8ed3fa542cc6
-
SHA256
4d5c26a3f902b1e664d982f31505eacbaae391e33cf76ea905af2886cf9e96c1
-
SHA512
c28e51a4d4549c8ebe5a451245c00a5d376c06921e430c7cda9261ec46bb1d33d171297676de7a5d5023f963aa82b15e5a7938dee267af8fc53d3c312d2c8a29
-
SSDEEP
6144:Y6N9NPe+yIDFOHaWWFGYWWztHT3+cBIs6O30gk0TTLvgOkXdhFg:/N/Pt/FSPYWcdb6Ok90TPvgO8hFg
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 2592 route.exe 2212 zroute.exe 1096 zroute.exe 1060 zroute.exe 2504 zroute.exe 2900 zroute.exe 2060 zroute.exe -
Loads dropped DLL 9 IoCs
pid Process 2676 cmd.exe 2676 cmd.exe 2592 route.exe 2592 route.exe 2592 route.exe 2592 route.exe 2592 route.exe 2592 route.exe 2592 route.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\11f86284 = "C:\\Users\\Admin\\AppData\\Local\\Route0\\route.exe" 2020b5ab5a4a51c440fda716fe911245.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1948 2020b5ab5a4a51c440fda716fe911245.exe 2592 route.exe 2212 zroute.exe 1096 zroute.exe 1060 zroute.exe 2504 zroute.exe 2900 zroute.exe 2060 zroute.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1692 1948 2020b5ab5a4a51c440fda716fe911245.exe 29 PID 1948 wrote to memory of 1692 1948 2020b5ab5a4a51c440fda716fe911245.exe 29 PID 1948 wrote to memory of 1692 1948 2020b5ab5a4a51c440fda716fe911245.exe 29 PID 1948 wrote to memory of 1692 1948 2020b5ab5a4a51c440fda716fe911245.exe 29 PID 1948 wrote to memory of 2532 1948 2020b5ab5a4a51c440fda716fe911245.exe 31 PID 1948 wrote to memory of 2532 1948 2020b5ab5a4a51c440fda716fe911245.exe 31 PID 1948 wrote to memory of 2532 1948 2020b5ab5a4a51c440fda716fe911245.exe 31 PID 1948 wrote to memory of 2532 1948 2020b5ab5a4a51c440fda716fe911245.exe 31 PID 1948 wrote to memory of 2676 1948 2020b5ab5a4a51c440fda716fe911245.exe 33 PID 1948 wrote to memory of 2676 1948 2020b5ab5a4a51c440fda716fe911245.exe 33 PID 1948 wrote to memory of 2676 1948 2020b5ab5a4a51c440fda716fe911245.exe 33 PID 1948 wrote to memory of 2676 1948 2020b5ab5a4a51c440fda716fe911245.exe 33 PID 2676 wrote to memory of 2592 2676 cmd.exe 35 PID 2676 wrote to memory of 2592 2676 cmd.exe 35 PID 2676 wrote to memory of 2592 2676 cmd.exe 35 PID 2676 wrote to memory of 2592 2676 cmd.exe 35 PID 2592 wrote to memory of 2212 2592 route.exe 38 PID 2592 wrote to memory of 2212 2592 route.exe 38 PID 2592 wrote to memory of 2212 2592 route.exe 38 PID 2592 wrote to memory of 2212 2592 route.exe 38 PID 2592 wrote to memory of 1096 2592 route.exe 39 PID 2592 wrote to memory of 1096 2592 route.exe 39 PID 2592 wrote to memory of 1096 2592 route.exe 39 PID 2592 wrote to memory of 1096 2592 route.exe 39 PID 2592 wrote to memory of 1060 2592 route.exe 40 PID 2592 wrote to memory of 1060 2592 route.exe 40 PID 2592 wrote to memory of 1060 2592 route.exe 40 PID 2592 wrote to memory of 1060 2592 route.exe 40 PID 2592 wrote to memory of 2504 2592 route.exe 41 PID 2592 wrote to memory of 2504 2592 route.exe 41 PID 2592 wrote to memory of 2504 2592 route.exe 41 PID 2592 wrote to memory of 2504 2592 route.exe 41 PID 2592 wrote to memory of 2900 2592 route.exe 42 PID 2592 wrote to memory of 2900 2592 route.exe 42 PID 2592 wrote to memory of 2900 2592 route.exe 42 PID 2592 wrote to memory of 2900 2592 route.exe 42 PID 2592 wrote to memory of 2060 2592 route.exe 43 PID 2592 wrote to memory of 2060 2592 route.exe 43 PID 2592 wrote to memory of 2060 2592 route.exe 43 PID 2592 wrote to memory of 2060 2592 route.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\2020b5ab5a4a51c440fda716fe911245.exe"C:\Users\Admin\AppData\Local\Temp\2020b5ab5a4a51c440fda716fe911245.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\cmd.execmd.exe /c type "C:\Users\Admin\AppData\Local\Temp\2020b5ab5a4a51c440fda716fe911245.exe" > "C:\Users\Admin\AppData\Local\Route0\route.exe"2⤵PID:1692
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c type "C:\Users\Admin\AppData\Local\Temp\2020b5ab5a4a51c440fda716fe911245.exe" > "C:\Users\Admin\AppData\Local\Route0\zroute.exe"2⤵PID:2532
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c pushd C:\Users\Admin\AppData\Local\Route0 & start route.exe & popd2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Route0\route.exeroute.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Route0\zroute.exeC:\Users\Admin\AppData\Local\Route0\zroute.exe --c4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2212
-
-
C:\Users\Admin\AppData\Local\Route0\zroute.exeC:\Users\Admin\AppData\Local\Route0\zroute.exe --cs4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1096
-
-
C:\Users\Admin\AppData\Local\Route0\zroute.exeC:\Users\Admin\AppData\Local\Route0\zroute.exe --w4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1060
-
-
C:\Users\Admin\AppData\Local\Route0\zroute.exeC:\Users\Admin\AppData\Local\Route0\zroute.exe --p4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2504
-
-
C:\Users\Admin\AppData\Local\Route0\zroute.exeC:\Users\Admin\AppData\Local\Route0\zroute.exe --b4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
C:\Users\Admin\AppData\Local\Route0\zroute.exeC:\Users\Admin\AppData\Local\Route0\zroute.exe --b4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2060
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
Filesize
17B
MD566066e21e21796c0aad666f3be52881e
SHA178fc91278fa109c8643f7989fb10d2e1162b24a7
SHA25680327c853d68b334f1c972a4d83ce6bb981a15a465149e2609d3195e7700c9bc
SHA5124fcce33079cb24adf01c5d800f4bd44fb7a9a289fca01a2fe9d464df76f8e18cf1149446dbe21dba961342b938cb5633844663e36d84db2e867f567ce1fc04ce
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
487KB
MD52020b5ab5a4a51c440fda716fe911245
SHA1910c20a92e2f17db95a78d00629e8ed3fa542cc6
SHA2564d5c26a3f902b1e664d982f31505eacbaae391e33cf76ea905af2886cf9e96c1
SHA512c28e51a4d4549c8ebe5a451245c00a5d376c06921e430c7cda9261ec46bb1d33d171297676de7a5d5023f963aa82b15e5a7938dee267af8fc53d3c312d2c8a29