Analysis
-
max time kernel
113s -
max time network
153s -
platform
windows7_x64 -
resource
win7 -
submitted
09/07/2020, 07:39
Static task
static1
Behavioral task
behavioral1
Sample
MkXhxWHcc49zLgc.exe
Resource
win7
Behavioral task
behavioral2
Sample
MkXhxWHcc49zLgc.exe
Resource
win10v200430
General
-
Target
MkXhxWHcc49zLgc.exe
-
Size
1.1MB
-
MD5
aaa7c56e1365273d298fc27167a9c2bf
-
SHA1
c9836709996845921fa247cae630087455563672
-
SHA256
e4b1c7f2f04d674f545b52a14617dfc553b65991c4779d1b22bf41982d1201ff
-
SHA512
fd901395bdca4bd687d4746ed15007ec07923ff40f915d51ef3fb5e0777f576315deb8c51fbdf33381f49442fff80527bb03a1148892d63f33d6160d414ac158
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1612 MkXhxWHcc49zLgc.exe Token: SeDebugPrivilege 1828 MkXhxWHcc49zLgc.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1612 MkXhxWHcc49zLgc.exe 1828 MkXhxWHcc49zLgc.exe 1828 MkXhxWHcc49zLgc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1612 set thread context of 1828 1612 MkXhxWHcc49zLgc.exe 29 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1828 MkXhxWHcc49zLgc.exe -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1304 1612 MkXhxWHcc49zLgc.exe 26 PID 1612 wrote to memory of 1304 1612 MkXhxWHcc49zLgc.exe 26 PID 1612 wrote to memory of 1304 1612 MkXhxWHcc49zLgc.exe 26 PID 1612 wrote to memory of 1304 1612 MkXhxWHcc49zLgc.exe 26 PID 1612 wrote to memory of 1844 1612 MkXhxWHcc49zLgc.exe 28 PID 1612 wrote to memory of 1844 1612 MkXhxWHcc49zLgc.exe 28 PID 1612 wrote to memory of 1844 1612 MkXhxWHcc49zLgc.exe 28 PID 1612 wrote to memory of 1844 1612 MkXhxWHcc49zLgc.exe 28 PID 1612 wrote to memory of 1828 1612 MkXhxWHcc49zLgc.exe 29 PID 1612 wrote to memory of 1828 1612 MkXhxWHcc49zLgc.exe 29 PID 1612 wrote to memory of 1828 1612 MkXhxWHcc49zLgc.exe 29 PID 1612 wrote to memory of 1828 1612 MkXhxWHcc49zLgc.exe 29 PID 1612 wrote to memory of 1828 1612 MkXhxWHcc49zLgc.exe 29 PID 1612 wrote to memory of 1828 1612 MkXhxWHcc49zLgc.exe 29 PID 1612 wrote to memory of 1828 1612 MkXhxWHcc49zLgc.exe 29 PID 1612 wrote to memory of 1828 1612 MkXhxWHcc49zLgc.exe 29 PID 1612 wrote to memory of 1828 1612 MkXhxWHcc49zLgc.exe 29 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1828 MkXhxWHcc49zLgc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1304 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MkXhxWHcc49zLgc.exe"C:\Users\Admin\AppData\Local\Temp\MkXhxWHcc49zLgc.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SCgmiuqrW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3448.tmp"2⤵
- Creates scheduled task(s)
PID:1304
-
-
C:\Users\Admin\AppData\Local\Temp\MkXhxWHcc49zLgc.exe"{path}"2⤵PID:1844
-
-
C:\Users\Admin\AppData\Local\Temp\MkXhxWHcc49zLgc.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
PID:1828
-