Analysis

  • max time kernel
    151s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 23:32

General

  • Target

    2020b5ab5a4a51c440fda716fe911245.exe

  • Size

    487KB

  • MD5

    2020b5ab5a4a51c440fda716fe911245

  • SHA1

    910c20a92e2f17db95a78d00629e8ed3fa542cc6

  • SHA256

    4d5c26a3f902b1e664d982f31505eacbaae391e33cf76ea905af2886cf9e96c1

  • SHA512

    c28e51a4d4549c8ebe5a451245c00a5d376c06921e430c7cda9261ec46bb1d33d171297676de7a5d5023f963aa82b15e5a7938dee267af8fc53d3c312d2c8a29

  • SSDEEP

    6144:Y6N9NPe+yIDFOHaWWFGYWWztHT3+cBIs6O30gk0TTLvgOkXdhFg:/N/Pt/FSPYWcdb6Ok90TPvgO8hFg

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2020b5ab5a4a51c440fda716fe911245.exe
    "C:\Users\Admin\AppData\Local\Temp\2020b5ab5a4a51c440fda716fe911245.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c type "C:\Users\Admin\AppData\Local\Temp\2020b5ab5a4a51c440fda716fe911245.exe" > "C:\Users\Admin\AppData\Local\Route0\route.exe"
      2⤵
        PID:4980
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c type "C:\Users\Admin\AppData\Local\Temp\2020b5ab5a4a51c440fda716fe911245.exe" > "C:\Users\Admin\AppData\Local\Route0\zroute.exe"
        2⤵
          PID:1424
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c pushd C:\Users\Admin\AppData\Local\Route0 & start route.exe & popd
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3352
          • C:\Users\Admin\AppData\Local\Route0\route.exe
            route.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2540
            • C:\Users\Admin\AppData\Local\Route0\zroute.exe
              C:\Users\Admin\AppData\Local\Route0\zroute.exe --c
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1588
            • C:\Users\Admin\AppData\Local\Route0\zroute.exe
              C:\Users\Admin\AppData\Local\Route0\zroute.exe --cs
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1964
            • C:\Users\Admin\AppData\Local\Route0\zroute.exe
              C:\Users\Admin\AppData\Local\Route0\zroute.exe --w
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:5032
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 496
                5⤵
                • Program crash
                PID:3504
            • C:\Users\Admin\AppData\Local\Route0\zroute.exe
              C:\Users\Admin\AppData\Local\Route0\zroute.exe --p
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1440
            • C:\Users\Admin\AppData\Local\Route0\zroute.exe
              C:\Users\Admin\AppData\Local\Route0\zroute.exe --b
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:3496
            • C:\Users\Admin\AppData\Local\Route0\zroute.exe
              C:\Users\Admin\AppData\Local\Route0\zroute.exe --b
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:5100
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 516
          2⤵
          • Program crash
          PID:4876
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4824 -ip 4824
        1⤵
          PID:4316
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5032 -ip 5032
          1⤵
            PID:5040

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Route0\brt.pie

            Filesize

            2B

            MD5

            81051bcc2cf1bedf378224b0a93e2877

            SHA1

            ba8ab5a0280b953aa97435ff8946cbcbb2755a27

            SHA256

            7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

            SHA512

            1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

          • C:\Users\Admin\AppData\Local\Route0\log.dat

            Filesize

            17B

            MD5

            66066e21e21796c0aad666f3be52881e

            SHA1

            78fc91278fa109c8643f7989fb10d2e1162b24a7

            SHA256

            80327c853d68b334f1c972a4d83ce6bb981a15a465149e2609d3195e7700c9bc

            SHA512

            4fcce33079cb24adf01c5d800f4bd44fb7a9a289fca01a2fe9d464df76f8e18cf1149446dbe21dba961342b938cb5633844663e36d84db2e867f567ce1fc04ce

          • C:\Users\Admin\AppData\Local\Route0\route.exe

            Filesize

            487KB

            MD5

            2020b5ab5a4a51c440fda716fe911245

            SHA1

            910c20a92e2f17db95a78d00629e8ed3fa542cc6

            SHA256

            4d5c26a3f902b1e664d982f31505eacbaae391e33cf76ea905af2886cf9e96c1

            SHA512

            c28e51a4d4549c8ebe5a451245c00a5d376c06921e430c7cda9261ec46bb1d33d171297676de7a5d5023f963aa82b15e5a7938dee267af8fc53d3c312d2c8a29

          • memory/1440-78-0x0000000000CC0000-0x0000000000DC0000-memory.dmp

            Filesize

            1024KB

          • memory/1440-64-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/1440-77-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/1440-73-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/1440-63-0x0000000000CC0000-0x0000000000DC0000-memory.dmp

            Filesize

            1024KB

          • memory/1588-30-0x0000000000F90000-0x0000000001090000-memory.dmp

            Filesize

            1024KB

          • memory/1588-46-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/1588-49-0x0000000000F90000-0x0000000001090000-memory.dmp

            Filesize

            1024KB

          • memory/1588-32-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/1964-47-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/1964-54-0x0000000000CF0000-0x0000000000DF0000-memory.dmp

            Filesize

            1024KB

          • memory/1964-35-0x0000000000CF0000-0x0000000000DF0000-memory.dmp

            Filesize

            1024KB

          • memory/1964-37-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/2540-16-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/2540-22-0x0000000000EC0000-0x0000000000FC0000-memory.dmp

            Filesize

            1024KB

          • memory/2540-45-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/2540-19-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/2540-13-0x0000000001110000-0x0000000001179000-memory.dmp

            Filesize

            420KB

          • memory/2540-12-0x0000000000EC0000-0x0000000000FC0000-memory.dmp

            Filesize

            1024KB

          • memory/3496-87-0x0000000000DA0000-0x0000000000EA0000-memory.dmp

            Filesize

            1024KB

          • memory/3496-88-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/3496-93-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/3496-99-0x0000000000DA0000-0x0000000000EA0000-memory.dmp

            Filesize

            1024KB

          • memory/4824-21-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/4824-1-0x0000000000E20000-0x0000000000F20000-memory.dmp

            Filesize

            1024KB

          • memory/4824-2-0x0000000001120000-0x0000000001189000-memory.dmp

            Filesize

            420KB

          • memory/4824-5-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/4824-18-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/4824-20-0x0000000000E20000-0x0000000000F20000-memory.dmp

            Filesize

            1024KB

          • memory/5032-69-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-42-0x0000000000F00000-0x0000000001000000-memory.dmp

            Filesize

            1024KB

          • memory/5032-44-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-55-0x0000000000F00000-0x0000000001000000-memory.dmp

            Filesize

            1024KB

          • memory/5032-68-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-48-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/5032-53-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/5100-108-0x0000000000D90000-0x0000000000E90000-memory.dmp

            Filesize

            1024KB

          • memory/5100-110-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/5100-116-0x0000000000400000-0x0000000000C55000-memory.dmp

            Filesize

            8.3MB

          • memory/5100-124-0x0000000000D90000-0x0000000000E90000-memory.dmp

            Filesize

            1024KB