Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 14:43
Behavioral task
behavioral1
Sample
mp.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
mp.exe
Resource
win10v2004-20240611-en
General
-
Target
mp.exe
-
Size
9.2MB
-
MD5
bbc886e8c9dde33980c382263b7ce8b8
-
SHA1
a5953c53277cfb3db60f8060fe6d69ca87dc8ee4
-
SHA256
6f08d25994d6b37a4c711033e6b949ab66c15914952eb4c86efa504f727af635
-
SHA512
f247523b095cd3259a18ec2866491385326d8ae92b4cba0f068822b06730c9b7a15b9773ac0cd043a7b06655b0fe29d9cca7d6559c4ce0f9241f0abfab592bee
-
SSDEEP
196608:wssBSXxz17OxBaQR5MetJ05SuN1qpJ1pRONksJp:wssBSXxzIBaQR525do1pRbkp
Malware Config
Extracted
stealc
xprivate4
http://45.88.77.186
-
url_path
/93fc676dbd45174b.php
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2884-0-0x0000000140000000-0x0000000140943000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2768 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
mp.exedescription pid process target process PID 2884 set thread context of 2768 2884 mp.exe cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
mp.execmd.exeexplorer.exepid process 2884 mp.exe 2884 mp.exe 2768 cmd.exe 2768 cmd.exe 2704 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
mp.execmd.exepid process 2884 mp.exe 2768 cmd.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
mp.execmd.exedescription pid process target process PID 2884 wrote to memory of 2768 2884 mp.exe cmd.exe PID 2884 wrote to memory of 2768 2884 mp.exe cmd.exe PID 2884 wrote to memory of 2768 2884 mp.exe cmd.exe PID 2884 wrote to memory of 2768 2884 mp.exe cmd.exe PID 2884 wrote to memory of 2768 2884 mp.exe cmd.exe PID 2768 wrote to memory of 2704 2768 cmd.exe explorer.exe PID 2768 wrote to memory of 2704 2768 cmd.exe explorer.exe PID 2768 wrote to memory of 2704 2768 cmd.exe explorer.exe PID 2768 wrote to memory of 2704 2768 cmd.exe explorer.exe PID 2768 wrote to memory of 2704 2768 cmd.exe explorer.exe PID 2768 wrote to memory of 2704 2768 cmd.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\mp.exe"C:\Users\Admin\AppData\Local\Temp\mp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
860KB
MD5dcfe64d299f3c1a462064aaf9e266d43
SHA14d69a872084bc95c75e827fe3a99803da256365e
SHA256ca996df2419ba74a8902e582b6445aac6dbac8ce3443f986edc37ee4f899aed3
SHA512d7326902e80567725a6ae1f8fe9b12109a3823329d5a6dcaa1ab61908b9cb64ad7a08ce970fbde4a9edc8f3077991d938f0d9749a7a49cefd4fe6d53e5441f85