Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
26-05-2020 12:05
Static task
static1
Behavioral task
behavioral1
Sample
ZIRAT BANKA.IFT MESAJI.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
ZIRAT BANKA.IFT MESAJI.exe
Resource
win10v200430
General
-
Target
ZIRAT BANKA.IFT MESAJI.exe
-
Size
1.2MB
-
MD5
96463f1796847224b85a96752b59ff17
-
SHA1
ca05cf6c0eac29a22d1296a15804cec36a908347
-
SHA256
1f1e1c079253f774dc02a7ff4e103a781573288802ba8c87af6790626fbcfca6
-
SHA512
cd27c0801d2d33ddb0ce26a769fd51e844f8ac7301079afab3c786822c529cb924b7db7e4a1992af77edf011ad4ffd586191a8754ca3738846605eb67acf3f5c
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\C8A579F880\Log.txt
masslogger
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1092 ZIRAT BANKA.IFT MESAJI.exe -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1092 ZIRAT BANKA.IFT MESAJI.exe Token: SeDebugPrivilege 1784 InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1092 ZIRAT BANKA.IFT MESAJI.exe 1092 ZIRAT BANKA.IFT MESAJI.exe 1092 ZIRAT BANKA.IFT MESAJI.exe 1784 InstallUtil.exe 1784 InstallUtil.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1092 wrote to memory of 1784 1092 ZIRAT BANKA.IFT MESAJI.exe 26 PID 1092 wrote to memory of 1784 1092 ZIRAT BANKA.IFT MESAJI.exe 26 PID 1092 wrote to memory of 1784 1092 ZIRAT BANKA.IFT MESAJI.exe 26 PID 1092 wrote to memory of 1784 1092 ZIRAT BANKA.IFT MESAJI.exe 26 PID 1092 wrote to memory of 1784 1092 ZIRAT BANKA.IFT MESAJI.exe 26 PID 1092 wrote to memory of 1784 1092 ZIRAT BANKA.IFT MESAJI.exe 26 PID 1092 wrote to memory of 1784 1092 ZIRAT BANKA.IFT MESAJI.exe 26 PID 1092 wrote to memory of 1784 1092 ZIRAT BANKA.IFT MESAJI.exe 26 PID 1092 wrote to memory of 1784 1092 ZIRAT BANKA.IFT MESAJI.exe 26 PID 1092 wrote to memory of 1784 1092 ZIRAT BANKA.IFT MESAJI.exe 26 PID 1092 wrote to memory of 1784 1092 ZIRAT BANKA.IFT MESAJI.exe 26 PID 1092 wrote to memory of 1784 1092 ZIRAT BANKA.IFT MESAJI.exe 26 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1092 set thread context of 1784 1092 ZIRAT BANKA.IFT MESAJI.exe 26 -
Executes dropped EXE 1 IoCs
pid Process 1784 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1784 InstallUtil.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1784 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZIRAT BANKA.IFT MESAJI.exe"C:\Users\Admin\AppData\Local\Temp\ZIRAT BANKA.IFT MESAJI.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
PID:1784
-