Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 03:14
Behavioral task
behavioral1
Sample
mp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
mp.exe
Resource
win10v2004-20240508-en
General
-
Target
mp.exe
-
Size
9.2MB
-
MD5
bbc886e8c9dde33980c382263b7ce8b8
-
SHA1
a5953c53277cfb3db60f8060fe6d69ca87dc8ee4
-
SHA256
6f08d25994d6b37a4c711033e6b949ab66c15914952eb4c86efa504f727af635
-
SHA512
f247523b095cd3259a18ec2866491385326d8ae92b4cba0f068822b06730c9b7a15b9773ac0cd043a7b06655b0fe29d9cca7d6559c4ce0f9241f0abfab592bee
-
SSDEEP
196608:wssBSXxz17OxBaQR5MetJ05SuN1qpJ1pRONksJp:wssBSXxzIBaQR525do1pRbkp
Malware Config
Extracted
stealc
xprivate4
http://45.88.77.186
-
url_path
/93fc676dbd45174b.php
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
resource yara_rule behavioral1/memory/1724-0-0x0000000140000000-0x0000000140943000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Deletes itself 1 IoCs
pid Process 2348 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1724 set thread context of 2348 1724 mp.exe 28 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1724 mp.exe 1724 mp.exe 2348 cmd.exe 2348 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1724 mp.exe 2348 cmd.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2348 1724 mp.exe 28 PID 1724 wrote to memory of 2348 1724 mp.exe 28 PID 1724 wrote to memory of 2348 1724 mp.exe 28 PID 1724 wrote to memory of 2348 1724 mp.exe 28 PID 1724 wrote to memory of 2348 1724 mp.exe 28 PID 2348 wrote to memory of 2888 2348 cmd.exe 30 PID 2348 wrote to memory of 2888 2348 cmd.exe 30 PID 2348 wrote to memory of 2888 2348 cmd.exe 30 PID 2348 wrote to memory of 2888 2348 cmd.exe 30 PID 2348 wrote to memory of 2888 2348 cmd.exe 30 PID 2348 wrote to memory of 2888 2348 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\mp.exe"C:\Users\Admin\AppData\Local\Temp\mp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:2888
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
860KB
MD5e1585a3ddddcb182267e6a13bfc206d8
SHA1675fde2b7b0ec9aa61eab1612772e69a1ef4f7e1
SHA25660a3e6eab86c57cb496d17488a77e97098c76d01f95ca995d7e56dd43264594b
SHA512c7d3efc4049c19216486acee1cfc0c2afd230046abe4dd9939e408483f136043638316d0ea9537f0857f8330cd8fda4e2e6c5badb1144c1f5c546ac1d1d8fa74