Analysis
-
max time kernel
151s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 23:32
Static task
static1
Behavioral task
behavioral1
Sample
2020b5ab5a4a51c440fda716fe911245.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2020b5ab5a4a51c440fda716fe911245.exe
Resource
win10v2004-20231215-en
General
-
Target
2020b5ab5a4a51c440fda716fe911245.exe
-
Size
487KB
-
MD5
2020b5ab5a4a51c440fda716fe911245
-
SHA1
910c20a92e2f17db95a78d00629e8ed3fa542cc6
-
SHA256
4d5c26a3f902b1e664d982f31505eacbaae391e33cf76ea905af2886cf9e96c1
-
SHA512
c28e51a4d4549c8ebe5a451245c00a5d376c06921e430c7cda9261ec46bb1d33d171297676de7a5d5023f963aa82b15e5a7938dee267af8fc53d3c312d2c8a29
-
SSDEEP
6144:Y6N9NPe+yIDFOHaWWFGYWWztHT3+cBIs6O30gk0TTLvgOkXdhFg:/N/Pt/FSPYWcdb6Ok90TPvgO8hFg
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 2540 route.exe 1588 zroute.exe 1964 zroute.exe 5032 zroute.exe 1440 zroute.exe 3496 zroute.exe 5100 zroute.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\11f86284 = "C:\\Users\\Admin\\AppData\\Local\\Route0\\route.exe" 2020b5ab5a4a51c440fda716fe911245.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4876 4824 WerFault.exe 87 3504 5032 WerFault.exe 111 -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4824 2020b5ab5a4a51c440fda716fe911245.exe 2540 route.exe 1588 zroute.exe 1964 zroute.exe 5032 zroute.exe 1440 zroute.exe 3496 zroute.exe 5100 zroute.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4980 4824 2020b5ab5a4a51c440fda716fe911245.exe 92 PID 4824 wrote to memory of 4980 4824 2020b5ab5a4a51c440fda716fe911245.exe 92 PID 4824 wrote to memory of 4980 4824 2020b5ab5a4a51c440fda716fe911245.exe 92 PID 4824 wrote to memory of 1424 4824 2020b5ab5a4a51c440fda716fe911245.exe 94 PID 4824 wrote to memory of 1424 4824 2020b5ab5a4a51c440fda716fe911245.exe 94 PID 4824 wrote to memory of 1424 4824 2020b5ab5a4a51c440fda716fe911245.exe 94 PID 4824 wrote to memory of 3352 4824 2020b5ab5a4a51c440fda716fe911245.exe 96 PID 4824 wrote to memory of 3352 4824 2020b5ab5a4a51c440fda716fe911245.exe 96 PID 4824 wrote to memory of 3352 4824 2020b5ab5a4a51c440fda716fe911245.exe 96 PID 3352 wrote to memory of 2540 3352 cmd.exe 98 PID 3352 wrote to memory of 2540 3352 cmd.exe 98 PID 3352 wrote to memory of 2540 3352 cmd.exe 98 PID 2540 wrote to memory of 1588 2540 route.exe 108 PID 2540 wrote to memory of 1588 2540 route.exe 108 PID 2540 wrote to memory of 1588 2540 route.exe 108 PID 2540 wrote to memory of 1964 2540 route.exe 110 PID 2540 wrote to memory of 1964 2540 route.exe 110 PID 2540 wrote to memory of 1964 2540 route.exe 110 PID 2540 wrote to memory of 5032 2540 route.exe 111 PID 2540 wrote to memory of 5032 2540 route.exe 111 PID 2540 wrote to memory of 5032 2540 route.exe 111 PID 2540 wrote to memory of 1440 2540 route.exe 115 PID 2540 wrote to memory of 1440 2540 route.exe 115 PID 2540 wrote to memory of 1440 2540 route.exe 115 PID 2540 wrote to memory of 3496 2540 route.exe 123 PID 2540 wrote to memory of 3496 2540 route.exe 123 PID 2540 wrote to memory of 3496 2540 route.exe 123 PID 2540 wrote to memory of 5100 2540 route.exe 126 PID 2540 wrote to memory of 5100 2540 route.exe 126 PID 2540 wrote to memory of 5100 2540 route.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\2020b5ab5a4a51c440fda716fe911245.exe"C:\Users\Admin\AppData\Local\Temp\2020b5ab5a4a51c440fda716fe911245.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\cmd.execmd.exe /c type "C:\Users\Admin\AppData\Local\Temp\2020b5ab5a4a51c440fda716fe911245.exe" > "C:\Users\Admin\AppData\Local\Route0\route.exe"2⤵PID:4980
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c type "C:\Users\Admin\AppData\Local\Temp\2020b5ab5a4a51c440fda716fe911245.exe" > "C:\Users\Admin\AppData\Local\Route0\zroute.exe"2⤵PID:1424
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c pushd C:\Users\Admin\AppData\Local\Route0 & start route.exe & popd2⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Route0\route.exeroute.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Route0\zroute.exeC:\Users\Admin\AppData\Local\Route0\zroute.exe --c4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1588
-
-
C:\Users\Admin\AppData\Local\Route0\zroute.exeC:\Users\Admin\AppData\Local\Route0\zroute.exe --cs4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1964
-
-
C:\Users\Admin\AppData\Local\Route0\zroute.exeC:\Users\Admin\AppData\Local\Route0\zroute.exe --w4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 4965⤵
- Program crash
PID:3504
-
-
-
C:\Users\Admin\AppData\Local\Route0\zroute.exeC:\Users\Admin\AppData\Local\Route0\zroute.exe --p4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1440
-
-
C:\Users\Admin\AppData\Local\Route0\zroute.exeC:\Users\Admin\AppData\Local\Route0\zroute.exe --b4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3496
-
-
C:\Users\Admin\AppData\Local\Route0\zroute.exeC:\Users\Admin\AppData\Local\Route0\zroute.exe --b4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5100
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 5162⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4824 -ip 48241⤵PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5032 -ip 50321⤵PID:5040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
Filesize
17B
MD566066e21e21796c0aad666f3be52881e
SHA178fc91278fa109c8643f7989fb10d2e1162b24a7
SHA25680327c853d68b334f1c972a4d83ce6bb981a15a465149e2609d3195e7700c9bc
SHA5124fcce33079cb24adf01c5d800f4bd44fb7a9a289fca01a2fe9d464df76f8e18cf1149446dbe21dba961342b938cb5633844663e36d84db2e867f567ce1fc04ce
-
Filesize
487KB
MD52020b5ab5a4a51c440fda716fe911245
SHA1910c20a92e2f17db95a78d00629e8ed3fa542cc6
SHA2564d5c26a3f902b1e664d982f31505eacbaae391e33cf76ea905af2886cf9e96c1
SHA512c28e51a4d4549c8ebe5a451245c00a5d376c06921e430c7cda9261ec46bb1d33d171297676de7a5d5023f963aa82b15e5a7938dee267af8fc53d3c312d2c8a29