Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-02-2024 14:25
Static task
static1
Behavioral task
behavioral1
Sample
304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe
Resource
win10v2004-20231215-en
General
-
Target
304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe
-
Size
5.7MB
-
MD5
4685cc14b573164de4fb91315a6411ce
-
SHA1
ef14eee56ac6aec9b7b0c6bb71a926cf75720cfd
-
SHA256
304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d
-
SHA512
850c5f86ca101ea63d005a04cba52336323c257d3bbc000e73cc6c5d115fb7da6372ccdcf265a76d8feb2322b412a320d031d9d66996ffcfed9d2c59b4e62686
-
SSDEEP
98304:3sl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6UcR6T:3POuK6mn9NzgMoYkSIvUcwti7TQlvcin
Malware Config
Signatures
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Executes dropped EXE 1 IoCs
pid Process 2924 Update.exe -
Loads dropped DLL 2 IoCs
pid Process 1928 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 2924 Update.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 6 raw.githubusercontent.com 7 raw.githubusercontent.com 10 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2076 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2732 tasklist.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1692 reg.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1928 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 1928 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 1928 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 2924 Update.exe 2924 Update.exe 2924 Update.exe 2924 Update.exe 2924 Update.exe 2924 Update.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1928 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe Token: SeDebugPrivilege 2732 tasklist.exe Token: SeDebugPrivilege 2924 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2924 Update.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2860 1928 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 29 PID 1928 wrote to memory of 2860 1928 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 29 PID 1928 wrote to memory of 2860 1928 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 29 PID 2860 wrote to memory of 2732 2860 cmd.exe 31 PID 2860 wrote to memory of 2732 2860 cmd.exe 31 PID 2860 wrote to memory of 2732 2860 cmd.exe 31 PID 2860 wrote to memory of 2392 2860 cmd.exe 32 PID 2860 wrote to memory of 2392 2860 cmd.exe 32 PID 2860 wrote to memory of 2392 2860 cmd.exe 32 PID 2860 wrote to memory of 2076 2860 cmd.exe 33 PID 2860 wrote to memory of 2076 2860 cmd.exe 33 PID 2860 wrote to memory of 2076 2860 cmd.exe 33 PID 2860 wrote to memory of 2924 2860 cmd.exe 34 PID 2860 wrote to memory of 2924 2860 cmd.exe 34 PID 2860 wrote to memory of 2924 2860 cmd.exe 34 PID 2924 wrote to memory of 2456 2924 Update.exe 36 PID 2924 wrote to memory of 2456 2924 Update.exe 36 PID 2924 wrote to memory of 2456 2924 Update.exe 36 PID 2456 wrote to memory of 1692 2456 cmd.exe 37 PID 2456 wrote to memory of 1692 2456 cmd.exe 37 PID 2456 wrote to memory of 1692 2456 cmd.exe 37 PID 2924 wrote to memory of 2944 2924 Update.exe 38 PID 2924 wrote to memory of 2944 2924 Update.exe 38 PID 2924 wrote to memory of 2944 2924 Update.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe"C:\Users\Admin\AppData\Local\Temp\304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp317C.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp317C.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1928"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2392
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2076
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f4⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:1692
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2924 -s 13484⤵PID:2944
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256B
MD56ddfda0cd45f5bff89801f4e4f494552
SHA15f493ba3f4306dab5071361284c31a50ade3aa07
SHA256ecdb33f4d2b6e9c2042ee8b610e1a5d8a6b5be296105d6bce0390aad1d8a76b1
SHA5126296a5d85ec7e8d0fa179fbd109baf8faf5d1521531eae5271b7199c01c3ccbee2c6206b6a17b7850d7e55bce7ecd75742bfc53573af0dc4a18d78c667dc488e
-
Filesize
5.7MB
MD54685cc14b573164de4fb91315a6411ce
SHA1ef14eee56ac6aec9b7b0c6bb71a926cf75720cfd
SHA256304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d
SHA512850c5f86ca101ea63d005a04cba52336323c257d3bbc000e73cc6c5d115fb7da6372ccdcf265a76d8feb2322b412a320d031d9d66996ffcfed9d2c59b4e62686
-
Filesize
5.3MB
MD54d25d66a87237864c349a0270f74e633
SHA1478c530a3a076db9e7ae513b03febf8ea92dcd0a
SHA25611778a20806686af22d04bf5d978817c7441ed0c54c72390676a7643cd9e9012
SHA512c70c342b1ca1e42f34a5ae06d4888a676d3ade827069f4fcacec159268c565a5fd54fc28bb1e98ecd426f2bbeb20eceaac9644f03d3d6e9d5ea1b56597ac380d
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d