Analysis
-
max time kernel
96s -
max time network
138s -
platform
windows7_x64 -
resource
win7 -
submitted
09-07-2020 07:39
Static task
static1
Behavioral task
behavioral1
Sample
sZ5JiFfRsBQ6Tku.exe
Resource
win7
Behavioral task
behavioral2
Sample
sZ5JiFfRsBQ6Tku.exe
Resource
win10v200430
General
-
Target
sZ5JiFfRsBQ6Tku.exe
-
Size
1.1MB
-
MD5
d685eb26c1eb33c30201f51712f095ce
-
SHA1
360a6390533be7bdff392f115db5011f9ffebf10
-
SHA256
33bbefb4d3bb2a66e713a55da6b852df10241fb371ebda3e5a39a761bacca0b3
-
SHA512
0d7562e83bd33195d45f3f5441725eeeb942c3fd9c9dd468fe9c2e30a043fa34b00db403d18fb37d7dfb5d66ac4569b7fe2c89295248880b982ff9b3d379b2d6
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1844 1456 sZ5JiFfRsBQ6Tku.exe 26 PID 1456 wrote to memory of 1844 1456 sZ5JiFfRsBQ6Tku.exe 26 PID 1456 wrote to memory of 1844 1456 sZ5JiFfRsBQ6Tku.exe 26 PID 1456 wrote to memory of 1844 1456 sZ5JiFfRsBQ6Tku.exe 26 PID 1456 wrote to memory of 1580 1456 sZ5JiFfRsBQ6Tku.exe 28 PID 1456 wrote to memory of 1580 1456 sZ5JiFfRsBQ6Tku.exe 28 PID 1456 wrote to memory of 1580 1456 sZ5JiFfRsBQ6Tku.exe 28 PID 1456 wrote to memory of 1580 1456 sZ5JiFfRsBQ6Tku.exe 28 PID 1456 wrote to memory of 1580 1456 sZ5JiFfRsBQ6Tku.exe 28 PID 1456 wrote to memory of 1580 1456 sZ5JiFfRsBQ6Tku.exe 28 PID 1456 wrote to memory of 1580 1456 sZ5JiFfRsBQ6Tku.exe 28 PID 1456 wrote to memory of 1580 1456 sZ5JiFfRsBQ6Tku.exe 28 PID 1456 wrote to memory of 1580 1456 sZ5JiFfRsBQ6Tku.exe 28 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1456 set thread context of 1580 1456 sZ5JiFfRsBQ6Tku.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1580 sZ5JiFfRsBQ6Tku.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1844 schtasks.exe -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1580 sZ5JiFfRsBQ6Tku.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1580 sZ5JiFfRsBQ6Tku.exe 1580 sZ5JiFfRsBQ6Tku.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1580 sZ5JiFfRsBQ6Tku.exe -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\sZ5JiFfRsBQ6Tku.exe"C:\Users\Admin\AppData\Local\Temp\sZ5JiFfRsBQ6Tku.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1456 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fzmUrkXNgPQBE" /XML "C:\Users\Admin\AppData\Local\Temp\tmp32F1.tmp"2⤵
- Creates scheduled task(s)
PID:1844
-
-
C:\Users\Admin\AppData\Local\Temp\sZ5JiFfRsBQ6Tku.exe"{path}"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: AddClipboardFormatListener
PID:1580
-