Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2024 14:25
Static task
static1
Behavioral task
behavioral1
Sample
304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe
Resource
win10v2004-20231215-en
General
-
Target
304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe
-
Size
5.7MB
-
MD5
4685cc14b573164de4fb91315a6411ce
-
SHA1
ef14eee56ac6aec9b7b0c6bb71a926cf75720cfd
-
SHA256
304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d
-
SHA512
850c5f86ca101ea63d005a04cba52336323c257d3bbc000e73cc6c5d115fb7da6372ccdcf265a76d8feb2322b412a320d031d9d66996ffcfed9d2c59b4e62686
-
SSDEEP
98304:3sl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6UcR6T:3POuK6mn9NzgMoYkSIvUcwti7TQlvcin
Malware Config
Signatures
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation Update.exe -
Executes dropped EXE 1 IoCs
pid Process 920 Update.exe -
Loads dropped DLL 2 IoCs
pid Process 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 920 Update.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 12 raw.githubusercontent.com 13 raw.githubusercontent.com 27 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 392 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1460 tasklist.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4684 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe 920 Update.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe Token: SeDebugPrivilege 1460 tasklist.exe Token: SeDebugPrivilege 920 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 920 Update.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 60 wrote to memory of 3844 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 86 PID 60 wrote to memory of 3844 60 304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe 86 PID 3844 wrote to memory of 1460 3844 cmd.exe 88 PID 3844 wrote to memory of 1460 3844 cmd.exe 88 PID 3844 wrote to memory of 2240 3844 cmd.exe 89 PID 3844 wrote to memory of 2240 3844 cmd.exe 89 PID 3844 wrote to memory of 392 3844 cmd.exe 90 PID 3844 wrote to memory of 392 3844 cmd.exe 90 PID 3844 wrote to memory of 920 3844 cmd.exe 93 PID 3844 wrote to memory of 920 3844 cmd.exe 93 PID 920 wrote to memory of 2304 920 Update.exe 96 PID 920 wrote to memory of 2304 920 Update.exe 96 PID 2304 wrote to memory of 4684 2304 cmd.exe 98 PID 2304 wrote to memory of 4684 2304 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe"C:\Users\Admin\AppData\Local\Temp\304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp54E6.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp54E6.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 60"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2240
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:392
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f4⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:4684
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
254B
MD5551fc66107d275339f163d2735b4b9e5
SHA1e4b625a3972313e1e422624e954a5bdba8ef8e2d
SHA2568a1b52c8150ad8fd6f9293eb1c77192c726ce2e917be0d168ba06a2dd177fe61
SHA512f387f5e56d34ad37ae85991a7ea3cc9ad8f98d7b497774f1cf79a54d9fa92c1eae806ae84c6ff96d8b46bc1e2bf3135241b9a9211f932e2bf22b5d14c5bd8139
-
Filesize
5.7MB
MD54685cc14b573164de4fb91315a6411ce
SHA1ef14eee56ac6aec9b7b0c6bb71a926cf75720cfd
SHA256304ef66a063c8d7f349e1ccae332c3d0671e39923bdc6be1dd8e788255f9575d
SHA512850c5f86ca101ea63d005a04cba52336323c257d3bbc000e73cc6c5d115fb7da6372ccdcf265a76d8feb2322b412a320d031d9d66996ffcfed9d2c59b4e62686