Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
14-07-2020 13:44
Static task
static1
Behavioral task
behavioral1
Sample
UOg6ZfxoyRuAGSn.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
UOg6ZfxoyRuAGSn.exe
Resource
win10
General
-
Target
UOg6ZfxoyRuAGSn.exe
-
Size
976KB
-
MD5
7bf5ded25fe2da584758d62b972f137c
-
SHA1
1ef899d23c5e4a088d82cdc545d317df170bdc20
-
SHA256
e4031bfc8a9e6268a0c5c85697424583fcf998bc75728a3b9b2f779879f167a4
-
SHA512
72a2386e36347553c63b1efff9f84e005b782c087faa4227876b54c316c9d195efa8cf866e8232ada9cfea9b5aef5750a7887c61c5269883948296591e918051
Malware Config
Extracted
C:\Users\Admin\AppData\Local\C8A579F880\Log.txt
masslogger
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1292 set thread context of 1768 1292 UOg6ZfxoyRuAGSn.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1768 UOg6ZfxoyRuAGSn.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1768 UOg6ZfxoyRuAGSn.exe 1768 UOg6ZfxoyRuAGSn.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1768 UOg6ZfxoyRuAGSn.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1816 schtasks.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1816 1292 UOg6ZfxoyRuAGSn.exe 26 PID 1292 wrote to memory of 1816 1292 UOg6ZfxoyRuAGSn.exe 26 PID 1292 wrote to memory of 1816 1292 UOg6ZfxoyRuAGSn.exe 26 PID 1292 wrote to memory of 1816 1292 UOg6ZfxoyRuAGSn.exe 26 PID 1292 wrote to memory of 1768 1292 UOg6ZfxoyRuAGSn.exe 28 PID 1292 wrote to memory of 1768 1292 UOg6ZfxoyRuAGSn.exe 28 PID 1292 wrote to memory of 1768 1292 UOg6ZfxoyRuAGSn.exe 28 PID 1292 wrote to memory of 1768 1292 UOg6ZfxoyRuAGSn.exe 28 PID 1292 wrote to memory of 1768 1292 UOg6ZfxoyRuAGSn.exe 28 PID 1292 wrote to memory of 1768 1292 UOg6ZfxoyRuAGSn.exe 28 PID 1292 wrote to memory of 1768 1292 UOg6ZfxoyRuAGSn.exe 28 PID 1292 wrote to memory of 1768 1292 UOg6ZfxoyRuAGSn.exe 28 PID 1292 wrote to memory of 1768 1292 UOg6ZfxoyRuAGSn.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1768 UOg6ZfxoyRuAGSn.exe -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
Processes
-
C:\Users\Admin\AppData\Local\Temp\UOg6ZfxoyRuAGSn.exe"C:\Users\Admin\AppData\Local\Temp\UOg6ZfxoyRuAGSn.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aHrQlvhZde" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB4BD.tmp"2⤵
- Creates scheduled task(s)
PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\UOg6ZfxoyRuAGSn.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1768
-