Analysis
-
max time kernel
107s -
max time network
98s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
09/07/2020, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
YvHF6Lp7RzXCeb2.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
YvHF6Lp7RzXCeb2.exe
Resource
win10
General
-
Target
YvHF6Lp7RzXCeb2.exe
-
Size
1.1MB
-
MD5
7c349d8e668f1347eba0f138c28c4019
-
SHA1
d6bf314945052ddd8a26139098c782aedd359b88
-
SHA256
afdef065db92bacabeb6a8b638ff1adcded1a0f578c36ac89128d13cdf701234
-
SHA512
dbf66e2e3558539de8e25ea96dc2c91e1343e1f991e9cf6fce8b360b1336dcb98cf904309dc76a487e66ba3278ca673b136ad28729492a0832239997c2ae4e3d
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 736 wrote to memory of 1952 736 YvHF6Lp7RzXCeb2.exe 26 PID 736 wrote to memory of 1952 736 YvHF6Lp7RzXCeb2.exe 26 PID 736 wrote to memory of 1952 736 YvHF6Lp7RzXCeb2.exe 26 PID 736 wrote to memory of 1952 736 YvHF6Lp7RzXCeb2.exe 26 PID 736 wrote to memory of 1840 736 YvHF6Lp7RzXCeb2.exe 28 PID 736 wrote to memory of 1840 736 YvHF6Lp7RzXCeb2.exe 28 PID 736 wrote to memory of 1840 736 YvHF6Lp7RzXCeb2.exe 28 PID 736 wrote to memory of 1840 736 YvHF6Lp7RzXCeb2.exe 28 PID 736 wrote to memory of 1840 736 YvHF6Lp7RzXCeb2.exe 28 PID 736 wrote to memory of 1840 736 YvHF6Lp7RzXCeb2.exe 28 PID 736 wrote to memory of 1840 736 YvHF6Lp7RzXCeb2.exe 28 PID 736 wrote to memory of 1840 736 YvHF6Lp7RzXCeb2.exe 28 PID 736 wrote to memory of 1840 736 YvHF6Lp7RzXCeb2.exe 28 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 736 set thread context of 1840 736 YvHF6Lp7RzXCeb2.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1840 YvHF6Lp7RzXCeb2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1840 YvHF6Lp7RzXCeb2.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1840 YvHF6Lp7RzXCeb2.exe -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1952 schtasks.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1840 YvHF6Lp7RzXCeb2.exe 1840 YvHF6Lp7RzXCeb2.exe -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file
Processes
-
C:\Users\Admin\AppData\Local\Temp\YvHF6Lp7RzXCeb2.exe"C:\Users\Admin\AppData\Local\Temp\YvHF6Lp7RzXCeb2.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:736 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JKAdPot" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB2CA.tmp"2⤵
- Creates scheduled task(s)
PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\YvHF6Lp7RzXCeb2.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:1840
-