Analysis
-
max time kernel
80s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 03:14
Behavioral task
behavioral1
Sample
mp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
mp.exe
Resource
win10v2004-20240508-en
General
-
Target
mp.exe
-
Size
9.2MB
-
MD5
bbc886e8c9dde33980c382263b7ce8b8
-
SHA1
a5953c53277cfb3db60f8060fe6d69ca87dc8ee4
-
SHA256
6f08d25994d6b37a4c711033e6b949ab66c15914952eb4c86efa504f727af635
-
SHA512
f247523b095cd3259a18ec2866491385326d8ae92b4cba0f068822b06730c9b7a15b9773ac0cd043a7b06655b0fe29d9cca7d6559c4ce0f9241f0abfab592bee
-
SSDEEP
196608:wssBSXxz17OxBaQR5MetJ05SuN1qpJ1pRONksJp:wssBSXxzIBaQR525do1pRbkp
Malware Config
Extracted
stealc
xprivate4
http://45.88.77.186
-
url_path
/93fc676dbd45174b.php
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
resource yara_rule behavioral2/memory/3200-0-0x0000000140000000-0x0000000140943000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Deletes itself 1 IoCs
pid Process 5000 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3200 set thread context of 5000 3200 mp.exe 85 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3200 mp.exe 3200 mp.exe 5000 cmd.exe 5000 cmd.exe 4496 explorer.exe 4496 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3200 mp.exe 5000 cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3200 wrote to memory of 5000 3200 mp.exe 85 PID 3200 wrote to memory of 5000 3200 mp.exe 85 PID 3200 wrote to memory of 5000 3200 mp.exe 85 PID 3200 wrote to memory of 5000 3200 mp.exe 85 PID 5000 wrote to memory of 4496 5000 cmd.exe 87 PID 5000 wrote to memory of 4496 5000 cmd.exe 87 PID 5000 wrote to memory of 4496 5000 cmd.exe 87 PID 5000 wrote to memory of 4496 5000 cmd.exe 87 PID 5000 wrote to memory of 4496 5000 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\mp.exe"C:\Users\Admin\AppData\Local\Temp\mp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
860KB
MD58eb66daf67881808a2cbfc44968c67a1
SHA1bedeafb20a6c40963792b5073471d9ddf0a18a3d
SHA256c6c6c9c5a3bf247bef76187aade92b75afaf18cf98fb83c92d4866dfa5a5732d
SHA512f78300c1cd65843bc9056f2470334b284061cff26920c65a3f4e2ce8a34c6a75b8464e6872190334a9d143d2613a7854d978a2686253136aa1d0e9677b97e05e