Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 02:32
Static task
static1
Behavioral task
behavioral1
Sample
db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe
Resource
win10v2004-20231215-en
General
-
Target
db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe
-
Size
5.6MB
-
MD5
731812403191b60503e017d88e23b1a3
-
SHA1
67e1c24ded75620181916dea9654eeddf4049525
-
SHA256
db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2
-
SHA512
1ae78e7d5e134d56ebbe9ec3e71bd7529aedbe5670a93b7728eca0aa482ac6688187884c5a61c2c8ef308acda555152d4d5cd2938d1cfa57303a8649803f01d5
-
SSDEEP
98304:nsl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6UcR6m:nPOuK6mn9NzgMoYkSIvUcwti7TQlvciK
Malware Config
Signatures
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation Update.exe -
Executes dropped EXE 1 IoCs
pid Process 4556 Update.exe -
Loads dropped DLL 2 IoCs
pid Process 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 4556 Update.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 11 raw.githubusercontent.com 13 raw.githubusercontent.com 23 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4940 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2132 tasklist.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1136 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe 4556 Update.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe Token: SeDebugPrivilege 2132 tasklist.exe Token: SeDebugPrivilege 4556 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4556 Update.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2088 wrote to memory of 4180 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 85 PID 2088 wrote to memory of 4180 2088 db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe 85 PID 4180 wrote to memory of 2132 4180 cmd.exe 87 PID 4180 wrote to memory of 2132 4180 cmd.exe 87 PID 4180 wrote to memory of 3516 4180 cmd.exe 88 PID 4180 wrote to memory of 3516 4180 cmd.exe 88 PID 4180 wrote to memory of 4940 4180 cmd.exe 89 PID 4180 wrote to memory of 4940 4180 cmd.exe 89 PID 4180 wrote to memory of 4556 4180 cmd.exe 90 PID 4180 wrote to memory of 4556 4180 cmd.exe 90 PID 4556 wrote to memory of 2788 4556 Update.exe 94 PID 4556 wrote to memory of 2788 4556 Update.exe 94 PID 2788 wrote to memory of 1136 2788 cmd.exe 96 PID 2788 wrote to memory of 1136 2788 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe"C:\Users\Admin\AppData\Local\Temp\db874ae685d2bc4235b1213ec9d43d327c8d2bd12300bb0d78c9ce0a84c828b2.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp828E.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp828E.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2088"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:3516
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:4940
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f4⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:1136
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
256B
MD53eb690ca690c03dc67e02ccd216db36d
SHA14bddbabf7ba7cb4a35282255866124d871387bf0
SHA25671f803827008f3948862e9aa86b98335a41a20eb9ad35bfccfcff1808e9bfef7
SHA512f22e85c3ea2bc2725fe511f3cbd541330ea5b434fff5957f40f8871f2bbbfb0740aaaa7a7a6d00d9cf2bbb18ef02b9f64d6eeaf143d8d4dfc9a99c528f409d61
-
Filesize
1.4MB
MD532766b3644e5648eac3cb3e490a3ac12
SHA18d8283e034bf10e71fc61cecf52a829cf25aa2e0
SHA256443ae2916230264161c44d30c2ead07be4cb395e9137c9650cc63d2db7a899ad
SHA5128fb94a3f345336f381129e1cfbeca9f8467949fd593360b0912df8ef827adace5f9322dbd97a0d90d29d288edf07748402810b549e6082e658a6e4f9274c7d80
-
Filesize
896KB
MD5ea7c3b637166567dad903baf077900b1
SHA1fca3a65a3b5a5cb74a152f2c31d8932c33be1ebc
SHA256a2479abcc63d8d451b1cf958c517c2681f3c26a45f2928c01053aed67961d5de
SHA512d8120f4ad55f9de497f461cbee8a5a3d53263a8a5430ac23f8d5ec71e19d15350538e46529b508081ee4658f8cd64e4b89418adcbbd433009eeaa7417aba364a