Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7 -
submitted
13-07-2020 06:49
Static task
static1
Behavioral task
behavioral1
Sample
5f248cb4805098190906c9fd9dd9caa8.exe
Resource
win7
Behavioral task
behavioral2
Sample
5f248cb4805098190906c9fd9dd9caa8.exe
Resource
win10v200430
General
-
Target
5f248cb4805098190906c9fd9dd9caa8.exe
-
Size
1.1MB
-
MD5
5f248cb4805098190906c9fd9dd9caa8
-
SHA1
49d5b6670b587a6f1c4d94f8aa6e0af7c0c9c0f6
-
SHA256
eda87d9c8cca853fe6620d6a246f94a8ee739c7278fb4c68c46374b598cdb842
-
SHA512
2444545aeaf33f30318fc6b795e5fa7eaf7258d68b18328af5ea80d8cf67ed443a202a19a43d13bf2661487e2d7bac420d3feb1ea9826d248a96738875b9df1e
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
hjiwws.exedescription pid process target process PID 1004 set thread context of 780 1004 hjiwws.exe hjiwws.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
hjiwws.exepid process 780 hjiwws.exe -
NTFS ADS 1 IoCs
Processes:
notepad.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\app\hjiwws.exe:ZoneIdentifier notepad.exe -
Loads dropped DLL 2 IoCs
Processes:
notepad.exepid process 1512 notepad.exe 1512 notepad.exe -
Executes dropped EXE 3 IoCs
Processes:
hjiwws.exehjiwws.exehjiwws.exepid process 1004 hjiwws.exe 780 hjiwws.exe 828 hjiwws.exe -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
UPX packed file 3 IoCs
Detects executables packed with UPX/modified UPX open source packer.
Processes:
resource yara_rule behavioral1/memory/780-7-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/780-12-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/780-13-0x0000000000400000-0x0000000000541000-memory.dmp upx -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Drops startup file 1 IoCs
Processes:
notepad.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.vbs notepad.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
5f248cb4805098190906c9fd9dd9caa8.exenotepad.exehjiwws.exedescription pid process target process PID 1460 wrote to memory of 1512 1460 5f248cb4805098190906c9fd9dd9caa8.exe notepad.exe PID 1460 wrote to memory of 1512 1460 5f248cb4805098190906c9fd9dd9caa8.exe notepad.exe PID 1460 wrote to memory of 1512 1460 5f248cb4805098190906c9fd9dd9caa8.exe notepad.exe PID 1460 wrote to memory of 1512 1460 5f248cb4805098190906c9fd9dd9caa8.exe notepad.exe PID 1460 wrote to memory of 1512 1460 5f248cb4805098190906c9fd9dd9caa8.exe notepad.exe PID 1460 wrote to memory of 1512 1460 5f248cb4805098190906c9fd9dd9caa8.exe notepad.exe PID 1512 wrote to memory of 1004 1512 notepad.exe hjiwws.exe PID 1512 wrote to memory of 1004 1512 notepad.exe hjiwws.exe PID 1512 wrote to memory of 1004 1512 notepad.exe hjiwws.exe PID 1512 wrote to memory of 1004 1512 notepad.exe hjiwws.exe PID 1004 wrote to memory of 780 1004 hjiwws.exe hjiwws.exe PID 1004 wrote to memory of 780 1004 hjiwws.exe hjiwws.exe PID 1004 wrote to memory of 780 1004 hjiwws.exe hjiwws.exe PID 1004 wrote to memory of 780 1004 hjiwws.exe hjiwws.exe PID 1004 wrote to memory of 828 1004 hjiwws.exe hjiwws.exe PID 1004 wrote to memory of 828 1004 hjiwws.exe hjiwws.exe PID 1004 wrote to memory of 828 1004 hjiwws.exe hjiwws.exe PID 1004 wrote to memory of 828 1004 hjiwws.exe hjiwws.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
hjiwws.exepid process 1004 hjiwws.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
hjiwws.exedescription pid process Token: SeDebugPrivilege 780 hjiwws.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
hjiwws.exepid process 780 hjiwws.exe -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Suspicious behavior: EnumeratesProcesses 1368 IoCs
Processes:
5f248cb4805098190906c9fd9dd9caa8.exehjiwws.exehjiwws.exepid process 1460 5f248cb4805098190906c9fd9dd9caa8.exe 1004 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe 828 hjiwws.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f248cb4805098190906c9fd9dd9caa8.exe"C:\Users\Admin\AppData\Local\Temp\5f248cb4805098190906c9fd9dd9caa8.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- NTFS ADS
- Loads dropped DLL
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\app\hjiwws.exe"C:\Users\Admin\AppData\Roaming\app\hjiwws.exe"3⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\app\hjiwws.exe"C:\Users\Admin\AppData\Roaming\app\hjiwws.exe"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\app\hjiwws.exe"C:\Users\Admin\AppData\Roaming\app\hjiwws.exe" 2 780 695454⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\app\hjiwws.exe
-
C:\Users\Admin\AppData\Roaming\app\hjiwws.exe
-
C:\Users\Admin\AppData\Roaming\app\hjiwws.exe
-
C:\Users\Admin\AppData\Roaming\app\hjiwws.exe
-
\Users\Admin\AppData\Roaming\app\hjiwws.exe
-
\Users\Admin\AppData\Roaming\app\hjiwws.exe
-
memory/780-7-0x0000000000400000-0x0000000000541000-memory.dmpFilesize
1.3MB
-
memory/780-8-0x000000000053F740-mapping.dmp
-
memory/780-12-0x0000000000400000-0x0000000000541000-memory.dmpFilesize
1.3MB
-
memory/780-13-0x0000000000400000-0x0000000000541000-memory.dmpFilesize
1.3MB
-
memory/780-14-0x0000000001E80000-0x0000000001F1A000-memory.dmpFilesize
616KB
-
memory/780-15-0x0000000001FA2000-0x0000000001FA3000-memory.dmpFilesize
4KB
-
memory/780-16-0x00000000002A0000-0x0000000000333000-memory.dmpFilesize
588KB
-
memory/828-10-0x0000000000000000-mapping.dmp
-
memory/1004-4-0x0000000000000000-mapping.dmp
-
memory/1512-1-0x0000000000110000-0x0000000000111000-memory.dmpFilesize
4KB
-
memory/1512-0-0x0000000000000000-mapping.dmp