Analysis
-
max time kernel
299s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 07:23
Static task
static1
Behavioral task
behavioral1
Sample
888-RAT [Lifetime Activated]/888-RAT [Lifetime Activated].exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
888-RAT [Lifetime Activated]/data/command-reciever.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
888-RAT [Lifetime Activated]/data/user-interface.exe
Resource
win10v2004-20240426-en
General
-
Target
888-RAT [Lifetime Activated]/data/user-interface.exe
-
Size
5.6MB
-
MD5
b8703418e6c3d1ccd83b8d178ab9f4c9
-
SHA1
6fb0e1e0ee5bc745f52a1c29e3cf4b88a2298dd6
-
SHA256
d6e9972976881d3dad7ac2a0c66cd7dd81420908aae8b00195a02fdf756cfc5e
-
SHA512
75ff6e911691e3d0d32c25d4b6d275a2b6157dae418ce5507f3e3f1b321c3f0dee516b7db0fd6588860019a19862f43c5335c465829de7a418a71999b71cfc3f
-
SSDEEP
98304:sbl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6Ucf:s6OuK6mn9NzgMoYkSIvUcwti7TQlvciA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
user-interface.exeUpdate.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation user-interface.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Update.exe -
Executes dropped EXE 1 IoCs
Processes:
Update.exepid Process 2228 Update.exe -
Loads dropped DLL 2 IoCs
Processes:
user-interface.exeUpdate.exepid Process 4332 user-interface.exe 2228 Update.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdater = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLogger\\Update.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 22 raw.githubusercontent.com 23 raw.githubusercontent.com 35 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Update.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 672 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
user-interface.exeUpdate.exepid Process 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 4332 user-interface.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe 2228 Update.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
user-interface.exetasklist.exeUpdate.exedescription pid Process Token: SeDebugPrivilege 4332 user-interface.exe Token: SeDebugPrivilege 3484 tasklist.exe Token: SeDebugPrivilege 2228 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Update.exepid Process 2228 Update.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
user-interface.execmd.exeUpdate.execmd.exedescription pid Process procid_target PID 4332 wrote to memory of 4616 4332 user-interface.exe 91 PID 4332 wrote to memory of 4616 4332 user-interface.exe 91 PID 4616 wrote to memory of 3484 4616 cmd.exe 93 PID 4616 wrote to memory of 3484 4616 cmd.exe 93 PID 4616 wrote to memory of 784 4616 cmd.exe 94 PID 4616 wrote to memory of 784 4616 cmd.exe 94 PID 4616 wrote to memory of 672 4616 cmd.exe 95 PID 4616 wrote to memory of 672 4616 cmd.exe 95 PID 4616 wrote to memory of 2228 4616 cmd.exe 97 PID 4616 wrote to memory of 2228 4616 cmd.exe 97 PID 2228 wrote to memory of 4872 2228 Update.exe 100 PID 2228 wrote to memory of 4872 2228 Update.exe 100 PID 4872 wrote to memory of 372 4872 cmd.exe 102 PID 4872 wrote to memory of 372 4872 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\888-RAT [Lifetime Activated]\data\user-interface.exe"C:\Users\Admin\AppData\Local\Temp\888-RAT [Lifetime Activated]\data\user-interface.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp5554.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp5554.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 4332"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:784
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:672
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLogger\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLogger\Update.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdater /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLogger\Update.exe /f4⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdater /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLogger\Update.exe /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:372
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
288B
MD545cf3ede923e93b8458dc651a22b45c2
SHA12b08069ddd4e46d1af31edf7f4f1a9ffce7d9a05
SHA256d3d3d89817d3c1110e3b97677d1c2331575fa65384654a2f2fe4072f9cabd092
SHA512e8c2a53c06122bf0db4f7918ca38ee7ae376543ffad5b2456065240ecff5a7e1dbc96bccbebd8539224cdad0e6186a4380066f9fd800b8e38e2d88e24ede9ad9
-
Filesize
5.6MB
MD5b8703418e6c3d1ccd83b8d178ab9f4c9
SHA16fb0e1e0ee5bc745f52a1c29e3cf4b88a2298dd6
SHA256d6e9972976881d3dad7ac2a0c66cd7dd81420908aae8b00195a02fdf756cfc5e
SHA51275ff6e911691e3d0d32c25d4b6d275a2b6157dae418ce5507f3e3f1b321c3f0dee516b7db0fd6588860019a19862f43c5335c465829de7a418a71999b71cfc3f