Analysis
-
max time kernel
151s -
max time network
117s -
platform
windows7_x64 -
resource
win7 -
submitted
13-07-2020 06:49
Static task
static1
Behavioral task
behavioral1
Sample
c45cefc699ab04e4709c9cd3e8a49bb3.exe
Resource
win7
Behavioral task
behavioral2
Sample
c45cefc699ab04e4709c9cd3e8a49bb3.exe
Resource
win10v200430
General
-
Target
c45cefc699ab04e4709c9cd3e8a49bb3.exe
-
Size
1.1MB
-
MD5
c45cefc699ab04e4709c9cd3e8a49bb3
-
SHA1
e4e34cdb66b393283bfd0441ac3d3fea3c492f89
-
SHA256
f5f9d13ad521590ab458db196ce2e06d2d832cd179f445a75a86bf2fedbfcf40
-
SHA512
1d015cd4fe98e700ec0b24cc4f5885ccb5f47ba544b8a508340accdf32ea62740b3a1f72346fe5e395c5a939d312e7cb7203f354e98f28cad698e8c84dff00d1
Malware Config
Signatures
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
hjiwws.exepid process 1396 hjiwws.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
c45cefc699ab04e4709c9cd3e8a49bb3.exenotepad.exehjiwws.exedescription pid process target process PID 1108 wrote to memory of 316 1108 c45cefc699ab04e4709c9cd3e8a49bb3.exe notepad.exe PID 1108 wrote to memory of 316 1108 c45cefc699ab04e4709c9cd3e8a49bb3.exe notepad.exe PID 1108 wrote to memory of 316 1108 c45cefc699ab04e4709c9cd3e8a49bb3.exe notepad.exe PID 1108 wrote to memory of 316 1108 c45cefc699ab04e4709c9cd3e8a49bb3.exe notepad.exe PID 1108 wrote to memory of 316 1108 c45cefc699ab04e4709c9cd3e8a49bb3.exe notepad.exe PID 1108 wrote to memory of 316 1108 c45cefc699ab04e4709c9cd3e8a49bb3.exe notepad.exe PID 316 wrote to memory of 1396 316 notepad.exe hjiwws.exe PID 316 wrote to memory of 1396 316 notepad.exe hjiwws.exe PID 316 wrote to memory of 1396 316 notepad.exe hjiwws.exe PID 316 wrote to memory of 1396 316 notepad.exe hjiwws.exe PID 1396 wrote to memory of 1536 1396 hjiwws.exe hjiwws.exe PID 1396 wrote to memory of 1536 1396 hjiwws.exe hjiwws.exe PID 1396 wrote to memory of 1536 1396 hjiwws.exe hjiwws.exe PID 1396 wrote to memory of 1536 1396 hjiwws.exe hjiwws.exe PID 1396 wrote to memory of 1624 1396 hjiwws.exe hjiwws.exe PID 1396 wrote to memory of 1624 1396 hjiwws.exe hjiwws.exe PID 1396 wrote to memory of 1624 1396 hjiwws.exe hjiwws.exe PID 1396 wrote to memory of 1624 1396 hjiwws.exe hjiwws.exe -
Executes dropped EXE 3 IoCs
Processes:
hjiwws.exehjiwws.exehjiwws.exepid process 1396 hjiwws.exe 1536 hjiwws.exe 1624 hjiwws.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
hjiwws.exedescription pid process target process PID 1396 set thread context of 1536 1396 hjiwws.exe hjiwws.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
hjiwws.exepid process 1536 hjiwws.exe -
UPX packed file 3 IoCs
Detects executables packed with UPX/modified UPX open source packer.
Processes:
resource yara_rule behavioral1/memory/1536-7-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/1536-10-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/1536-13-0x0000000000400000-0x0000000000541000-memory.dmp upx -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Drops startup file 1 IoCs
Processes:
notepad.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.vbs notepad.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 1368 IoCs
Processes:
c45cefc699ab04e4709c9cd3e8a49bb3.exehjiwws.exehjiwws.exepid process 1108 c45cefc699ab04e4709c9cd3e8a49bb3.exe 1396 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe 1624 hjiwws.exe -
Loads dropped DLL 2 IoCs
Processes:
notepad.exepid process 316 notepad.exe 316 notepad.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
hjiwws.exedescription pid process Token: SeDebugPrivilege 1536 hjiwws.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
hjiwws.exepid process 1536 hjiwws.exe -
NTFS ADS 1 IoCs
Processes:
notepad.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\app\hjiwws.exe:ZoneIdentifier notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c45cefc699ab04e4709c9cd3e8a49bb3.exe"C:\Users\Admin\AppData\Local\Temp\c45cefc699ab04e4709c9cd3e8a49bb3.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Suspicious use of WriteProcessMemory
- Drops startup file
- Loads dropped DLL
- NTFS ADS
-
C:\Users\Admin\AppData\Roaming\app\hjiwws.exe"C:\Users\Admin\AppData\Roaming\app\hjiwws.exe"3⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\app\hjiwws.exe"C:\Users\Admin\AppData\Roaming\app\hjiwws.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: AddClipboardFormatListener
-
C:\Users\Admin\AppData\Roaming\app\hjiwws.exe"C:\Users\Admin\AppData\Roaming\app\hjiwws.exe" 2 1536 632584⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\app\hjiwws.exe
-
C:\Users\Admin\AppData\Roaming\app\hjiwws.exe
-
C:\Users\Admin\AppData\Roaming\app\hjiwws.exe
-
C:\Users\Admin\AppData\Roaming\app\hjiwws.exe
-
\Users\Admin\AppData\Roaming\app\hjiwws.exe
-
\Users\Admin\AppData\Roaming\app\hjiwws.exe
-
memory/316-1-0x00000000000D0000-0x00000000000D1000-memory.dmpFilesize
4KB
-
memory/316-0-0x0000000000000000-mapping.dmp
-
memory/1396-4-0x0000000000000000-mapping.dmp
-
memory/1536-10-0x0000000000400000-0x0000000000541000-memory.dmpFilesize
1.3MB
-
memory/1536-8-0x000000000053F760-mapping.dmp
-
memory/1536-7-0x0000000000400000-0x0000000000541000-memory.dmpFilesize
1.3MB
-
memory/1536-13-0x0000000000400000-0x0000000000541000-memory.dmpFilesize
1.3MB
-
memory/1536-14-0x0000000001F50000-0x0000000001FEA000-memory.dmpFilesize
616KB
-
memory/1536-15-0x0000000001F42000-0x0000000001F43000-memory.dmpFilesize
4KB
-
memory/1536-16-0x0000000000550000-0x00000000005E3000-memory.dmpFilesize
588KB
-
memory/1624-11-0x0000000000000000-mapping.dmp