Analysis
-
max time kernel
141s -
max time network
132s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
07/07/2020, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
Agency Fund JUNE20_Revised.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
Agency Fund JUNE20_Revised.exe
Resource
win10
General
-
Target
Agency Fund JUNE20_Revised.exe
-
Size
948KB
-
MD5
cfdd2d3dc883211f7a6f934e4b295714
-
SHA1
e7deccd6d0685263d69a4cdff890baa0865770b1
-
SHA256
98ec6884be9b64e2e37a37460bd3d8ca770f2ef2d1d5cd4b6321a01462c8d32b
-
SHA512
b14684e7d37c884eb2da0066ddf694360a56f279be55f8335985c0a82882b54f39f42e4fd991e77f5e394d6f29b386194365003c6dd048c6d5ed87c2172073a7
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\C8A579F880\Log.txt
masslogger
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1092 set thread context of 1776 1092 Agency Fund JUNE20_Revised.exe 30 -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1792 schtasks.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1092 wrote to memory of 1792 1092 Agency Fund JUNE20_Revised.exe 26 PID 1092 wrote to memory of 1792 1092 Agency Fund JUNE20_Revised.exe 26 PID 1092 wrote to memory of 1792 1092 Agency Fund JUNE20_Revised.exe 26 PID 1092 wrote to memory of 1792 1092 Agency Fund JUNE20_Revised.exe 26 PID 1092 wrote to memory of 1728 1092 Agency Fund JUNE20_Revised.exe 28 PID 1092 wrote to memory of 1728 1092 Agency Fund JUNE20_Revised.exe 28 PID 1092 wrote to memory of 1728 1092 Agency Fund JUNE20_Revised.exe 28 PID 1092 wrote to memory of 1728 1092 Agency Fund JUNE20_Revised.exe 28 PID 1092 wrote to memory of 1780 1092 Agency Fund JUNE20_Revised.exe 29 PID 1092 wrote to memory of 1780 1092 Agency Fund JUNE20_Revised.exe 29 PID 1092 wrote to memory of 1780 1092 Agency Fund JUNE20_Revised.exe 29 PID 1092 wrote to memory of 1780 1092 Agency Fund JUNE20_Revised.exe 29 PID 1092 wrote to memory of 1776 1092 Agency Fund JUNE20_Revised.exe 30 PID 1092 wrote to memory of 1776 1092 Agency Fund JUNE20_Revised.exe 30 PID 1092 wrote to memory of 1776 1092 Agency Fund JUNE20_Revised.exe 30 PID 1092 wrote to memory of 1776 1092 Agency Fund JUNE20_Revised.exe 30 PID 1092 wrote to memory of 1776 1092 Agency Fund JUNE20_Revised.exe 30 PID 1092 wrote to memory of 1776 1092 Agency Fund JUNE20_Revised.exe 30 PID 1092 wrote to memory of 1776 1092 Agency Fund JUNE20_Revised.exe 30 PID 1092 wrote to memory of 1776 1092 Agency Fund JUNE20_Revised.exe 30 PID 1092 wrote to memory of 1776 1092 Agency Fund JUNE20_Revised.exe 30 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1092 Agency Fund JUNE20_Revised.exe Token: SeDebugPrivilege 1776 Agency Fund JUNE20_Revised.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1092 Agency Fund JUNE20_Revised.exe 1092 Agency Fund JUNE20_Revised.exe 1092 Agency Fund JUNE20_Revised.exe 1776 Agency Fund JUNE20_Revised.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Agency Fund JUNE20_Revised.exe"C:\Users\Admin\AppData\Local\Temp\Agency Fund JUNE20_Revised.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1092 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BCUUDgKljBWP" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4681.tmp"2⤵
- Creates scheduled task(s)
PID:1792
-
-
C:\Users\Admin\AppData\Local\Temp\Agency Fund JUNE20_Revised.exe"{path}"2⤵PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\Agency Fund JUNE20_Revised.exe"{path}"2⤵PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\Agency Fund JUNE20_Revised.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1776
-