Analysis

  • max time kernel
    153s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2024, 20:50

General

  • Target

    MiLoginTool/MiLoginTool.exe

  • Size

    559KB

  • MD5

    7ea56572cbd4bdfec92d361ba8f99bc9

  • SHA1

    b54035462c51f17c46baeec42bcfb6afb8ec131b

  • SHA256

    1b07b3289e3ea10d749bb60a59c5c9ba0a412ce4ef359523dd8e1491479287c9

  • SHA512

    e47133fdac866ffcdb5540a29144cf27dbc2a8317f1f86a0fb3987b16ee7e38b011710cde7565e07a06cfa75f93e639c231d3cc15948ceb0ba6532989624b724

  • SSDEEP

    6144:2GiJIrQkQ8tMW3MxpY/2FONYLfKOoCSDzrXiWbgzEAOInYLWMsL:gIrzT3yCO8OfKOD0U46RL

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MiLoginTool\MiLoginTool.exe
    "C:\Users\Admin\AppData\Local\Temp\MiLoginTool\MiLoginTool.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\MiLoginTool\MiLoginTool.exe
      "C:\Users\Admin\AppData\Local\Temp\MiLoginTool\MiLoginTool.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent=仺盀⒈梙y_gXj潾椽筧亞PibiqU崝峯xZWy捕潨☉aefkgikVm亖榽僤b搏鲍W崼Sw〃ぃ猠jtaehpzz|ewxxS厬檿珶dkxmgwgW叓尞Ч煔蛋焧煫cjdfd|hprejX独q缓歲va"牣獮コejvig皔xrf矘喘稊檿b櫑c妷 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\MiLoginTool\debug.log" --mojo-platform-channel-handle=1068 --field-trial-handle=1100,i,6584172937604139059,12429419620355295147,131072 --disable-features=CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:2
      2⤵
        PID:2700
      • C:\Users\Admin\AppData\Local\Temp\MiLoginTool\MiLoginTool.exe
        "C:\Users\Admin\AppData\Local\Temp\MiLoginTool\MiLoginTool.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent=仺盀⒈梙y_gXj潾椽筧亞PibiqU崝峯xZWy捕潨☉aefkgikVm亖榽僤b搏鲍W崼Sw〃ぃ猠jtaehpzz|ewxxS厬檿珶dkxmgwgW叓尞Ч煔蛋焧煫cjdfd|hprejX独q缓歲va"牣獮コejvig皔xrf矘喘稊檿b櫑c妷 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --log-file="C:\Users\Admin\AppData\Local\Temp\MiLoginTool\debug.log" --mojo-platform-channel-handle=1240 --field-trial-handle=1100,i,6584172937604139059,12429419620355295147,131072 --disable-features=CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
        2⤵
          PID:456
        • C:\Users\Admin\AppData\Local\Temp\MiLoginTool\MiLoginTool.exe
          "C:\Users\Admin\AppData\Local\Temp\MiLoginTool\MiLoginTool.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent=仺盀⒈梙y_gXj潾椽筧亞PibiqU崝峯xZWy捕潨☉aefkgikVm亖榽僤b搏鲍W崼Sw〃ぃ猠jtaehpzz|ewxxS厬檿珶dkxmgwgW叓尞Ч煔蛋焧煫cjdfd|hprejX独q缓歲va"牣獮コejvig皔xrf矘喘稊檿b櫑c妷 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\MiLoginTool\debug.log" --mojo-platform-channel-handle=1132 --field-trial-handle=1100,i,6584172937604139059,12429419620355295147,131072 --disable-features=CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:2
          2⤵
            PID:2740
          • C:\Users\Admin\AppData\Local\Temp\MiLoginTool\MiLoginTool.exe
            "C:\Users\Admin\AppData\Local\Temp\MiLoginTool\MiLoginTool.exe" --type=renderer --log-severity=disable --user-agent=仺盀⒈梙y_gXj潾椽筧亞PibiqU崝峯xZWy捕潨☉aefkgikVm亖榽僤b搏鲍W崼Sw〃ぃ猠jtaehpzz|ewxxS厬檿珶dkxmgwgW叓尞Ч煔蛋焧煫cjdfd|hprejX独q缓歲va"牣獮コejvig皔xrf矘喘稊檿b櫑c妷 --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\MiLoginTool\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1452 --field-trial-handle=1100,i,6584172937604139059,12429419620355295147,131072 --disable-features=CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:1
            2⤵
            • Checks computer location settings
            PID:2636
          • C:\Users\Admin\AppData\Local\Temp\MiLoginTool\MiLoginTool.exe
            "C:\Users\Admin\AppData\Local\Temp\MiLoginTool\MiLoginTool.exe" --type=renderer --log-severity=disable --user-agent=仺盀⒈梙y_gXj潾椽筧亞PibiqU崝峯xZWy捕潨☉aefkgikVm亖榽僤b搏鲍W崼Sw〃ぃ猠jtaehpzz|ewxxS厬檿珶dkxmgwgW叓尞Ч煔蛋焧煫cjdfd|hprejX独q缓歲va"牣獮コejvig皔xrf矘喘稊檿b櫑c妷 --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\MiLoginTool\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=1460 --field-trial-handle=1100,i,6584172937604139059,12429419620355295147,131072 --disable-features=CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:1
            2⤵
            • Checks computer location settings
            PID:2832
          • C:\Users\Admin\AppData\Local\Temp\MiLoginTool\MiLoginTool.exe
            "C:\Users\Admin\AppData\Local\Temp\MiLoginTool\MiLoginTool.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent=仺盀⒈梙y_gXj潾椽筧亞PibiqU崝峯xZWy捕潨☉aefkgikVm亖榽僤b搏鲍W崼Sw〃ぃ猠jtaehpzz|ewxxS厬檿珶dkxmgwgW叓尞Ч煔蛋焧煫cjdfd|hprejX独q缓歲va"牣獮コejvig皔xrf矘喘稊檿b櫑c妷 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --log-file="C:\Users\Admin\AppData\Local\Temp\MiLoginTool\debug.log" --mojo-platform-channel-handle=1392 --field-trial-handle=1100,i,6584172937604139059,12429419620355295147,131072 --disable-features=CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:2
            2⤵
              PID:2260
            • C:\Users\Admin\AppData\Local\Temp\MiLoginTool\MiLoginTool.exe
              "C:\Users\Admin\AppData\Local\Temp\MiLoginTool\MiLoginTool.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent=仺盀⒈梙y_gXj潾椽筧亞PibiqU崝峯xZWy捕潨☉aefkgikVm亖榽僤b搏鲍W崼Sw〃ぃ猠jtaehpzz|ewxxS厬檿珶dkxmgwgW叓尞Ч煔蛋焧煫cjdfd|hprejX独q缓歲va"牣獮コejvig皔xrf矘喘稊檿b櫑c妷 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --log-file="C:\Users\Admin\AppData\Local\Temp\MiLoginTool\debug.log" --mojo-platform-channel-handle=1392 --field-trial-handle=1100,i,6584172937604139059,12429419620355295147,131072 --disable-features=CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:2
              2⤵
                PID:1404

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\CabA891.tmp

                    Filesize

                    65KB

                    MD5

                    ac05d27423a85adc1622c714f2cb6184

                    SHA1

                    b0fe2b1abddb97837ea0195be70ab2ff14d43198

                    SHA256

                    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                    SHA512

                    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                  • memory/2416-3-0x00000000007A0000-0x00000000007A1000-memory.dmp

                    Filesize

                    4KB