Analysis
-
max time kernel
94s -
max time network
140s -
platform
windows7_x64 -
resource
win7 -
submitted
14/07/2020, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
10ZYpleV7XW12Qh.exe
Resource
win7
Behavioral task
behavioral2
Sample
10ZYpleV7XW12Qh.exe
Resource
win10v200430
General
-
Target
10ZYpleV7XW12Qh.exe
-
Size
1.1MB
-
MD5
ca9cd6a5da6c838ae42b7fb8b0e66462
-
SHA1
1f48422dc91327ac3a2f5a4e770c4a3406037dca
-
SHA256
eaf233924580f52342e12c63fd6a33ec5db002b85a20b26a3e7534147d292bc5
-
SHA512
9ab9fed49a60f1f5801176b66db4ca45a8f1dee92b6fcd86462e2fdadaa703a32cbf16e49d4f97348c7e406fe30723c3409bc0cd750e90362747ebbfb76c4da3
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1916 10ZYpleV7XW12Qh.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1916 10ZYpleV7XW12Qh.exe 1916 10ZYpleV7XW12Qh.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1900 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1916 10ZYpleV7XW12Qh.exe -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1900 1492 10ZYpleV7XW12Qh.exe 26 PID 1492 wrote to memory of 1900 1492 10ZYpleV7XW12Qh.exe 26 PID 1492 wrote to memory of 1900 1492 10ZYpleV7XW12Qh.exe 26 PID 1492 wrote to memory of 1900 1492 10ZYpleV7XW12Qh.exe 26 PID 1492 wrote to memory of 1916 1492 10ZYpleV7XW12Qh.exe 28 PID 1492 wrote to memory of 1916 1492 10ZYpleV7XW12Qh.exe 28 PID 1492 wrote to memory of 1916 1492 10ZYpleV7XW12Qh.exe 28 PID 1492 wrote to memory of 1916 1492 10ZYpleV7XW12Qh.exe 28 PID 1492 wrote to memory of 1916 1492 10ZYpleV7XW12Qh.exe 28 PID 1492 wrote to memory of 1916 1492 10ZYpleV7XW12Qh.exe 28 PID 1492 wrote to memory of 1916 1492 10ZYpleV7XW12Qh.exe 28 PID 1492 wrote to memory of 1916 1492 10ZYpleV7XW12Qh.exe 28 PID 1492 wrote to memory of 1916 1492 10ZYpleV7XW12Qh.exe 28 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1492 set thread context of 1916 1492 10ZYpleV7XW12Qh.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1916 10ZYpleV7XW12Qh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10ZYpleV7XW12Qh.exe"C:\Users\Admin\AppData\Local\Temp\10ZYpleV7XW12Qh.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1492 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FFyBiLgOLYhDJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp20C8.tmp"2⤵
- Creates scheduled task(s)
PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\10ZYpleV7XW12Qh.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1916
-