Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 14:43
Behavioral task
behavioral1
Sample
mp.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
mp.exe
Resource
win10v2004-20240611-en
General
-
Target
mp.exe
-
Size
9.2MB
-
MD5
bbc886e8c9dde33980c382263b7ce8b8
-
SHA1
a5953c53277cfb3db60f8060fe6d69ca87dc8ee4
-
SHA256
6f08d25994d6b37a4c711033e6b949ab66c15914952eb4c86efa504f727af635
-
SHA512
f247523b095cd3259a18ec2866491385326d8ae92b4cba0f068822b06730c9b7a15b9773ac0cd043a7b06655b0fe29d9cca7d6559c4ce0f9241f0abfab592bee
-
SSDEEP
196608:wssBSXxz17OxBaQR5MetJ05SuN1qpJ1pRONksJp:wssBSXxzIBaQR525do1pRbkp
Malware Config
Extracted
stealc
xprivate4
http://45.88.77.186
-
url_path
/93fc676dbd45174b.php
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
resource yara_rule behavioral2/memory/636-0-0x0000000140000000-0x0000000140943000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Deletes itself 1 IoCs
pid Process 3948 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 636 set thread context of 3948 636 mp.exe 84 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 636 mp.exe 636 mp.exe 3948 cmd.exe 3948 cmd.exe 2592 explorer.exe 2592 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 636 mp.exe 3948 cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 636 wrote to memory of 3948 636 mp.exe 84 PID 636 wrote to memory of 3948 636 mp.exe 84 PID 636 wrote to memory of 3948 636 mp.exe 84 PID 636 wrote to memory of 3948 636 mp.exe 84 PID 3948 wrote to memory of 2592 3948 cmd.exe 87 PID 3948 wrote to memory of 2592 3948 cmd.exe 87 PID 3948 wrote to memory of 2592 3948 cmd.exe 87 PID 3948 wrote to memory of 2592 3948 cmd.exe 87 PID 3948 wrote to memory of 2592 3948 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\mp.exe"C:\Users\Admin\AppData\Local\Temp\mp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
860KB
MD5e865514cd10f35195ef460b35af7fa4a
SHA19a1cf33cc543fed1244ddb28024ca498f90dfdc9
SHA256c8762b81ab737ce5e55f184002031f4c9ceb8e883f56f68121123896949d05b0
SHA512caf1b5815a62a38f6fdff39dec5c3acc91517233b1e806abac2cffe4802caffb4e6be662656db47b8e7bb712ece9bace005e550ca1f4b01da6a0b9b9e19f307a