Analysis
-
max time kernel
101s -
max time network
142s -
platform
windows7_x64 -
resource
win7 -
submitted
17-07-2020 05:28
Static task
static1
Behavioral task
behavioral1
Sample
CXEStNhBHVr8t4j.exe
Resource
win7
Behavioral task
behavioral2
Sample
CXEStNhBHVr8t4j.exe
Resource
win10v200430
General
-
Target
CXEStNhBHVr8t4j.exe
-
Size
1.6MB
-
MD5
8ed41c5e460132f308df2d5de49efc1a
-
SHA1
807c717590eeccddaa4130a2ada854f695999e5d
-
SHA256
015da4d338b5ccb6a5ae37b29a30bdd80445280746011616535a26c60b4be0bb
-
SHA512
81dfefcc925e0e358cabf3a73fe9787d9b13c7d0a42dbb1bf898fa4e6d1dd2d3bd68a25018b2c445b6a6cc474634729e3bcf931deb6be29464b78c5951d12722
Malware Config
Extracted
C:\Users\Admin\AppData\Local\E2C1E8F1FA\Log.txt
masslogger
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1796 CXEStNhBHVr8t4j.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1796 CXEStNhBHVr8t4j.exe -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1812 1032 CXEStNhBHVr8t4j.exe 26 PID 1032 wrote to memory of 1812 1032 CXEStNhBHVr8t4j.exe 26 PID 1032 wrote to memory of 1812 1032 CXEStNhBHVr8t4j.exe 26 PID 1032 wrote to memory of 1812 1032 CXEStNhBHVr8t4j.exe 26 PID 1032 wrote to memory of 1796 1032 CXEStNhBHVr8t4j.exe 28 PID 1032 wrote to memory of 1796 1032 CXEStNhBHVr8t4j.exe 28 PID 1032 wrote to memory of 1796 1032 CXEStNhBHVr8t4j.exe 28 PID 1032 wrote to memory of 1796 1032 CXEStNhBHVr8t4j.exe 28 PID 1032 wrote to memory of 1796 1032 CXEStNhBHVr8t4j.exe 28 PID 1032 wrote to memory of 1796 1032 CXEStNhBHVr8t4j.exe 28 PID 1032 wrote to memory of 1796 1032 CXEStNhBHVr8t4j.exe 28 PID 1032 wrote to memory of 1796 1032 CXEStNhBHVr8t4j.exe 28 PID 1032 wrote to memory of 1796 1032 CXEStNhBHVr8t4j.exe 28 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1032 set thread context of 1796 1032 CXEStNhBHVr8t4j.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1796 CXEStNhBHVr8t4j.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1796 CXEStNhBHVr8t4j.exe 1796 CXEStNhBHVr8t4j.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1812 schtasks.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CXEStNhBHVr8t4j.exe"C:\Users\Admin\AppData\Local\Temp\CXEStNhBHVr8t4j.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1032 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aNbaoNnYTFc" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3F9E.tmp"2⤵
- Creates scheduled task(s)
PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\CXEStNhBHVr8t4j.exe"{path}"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1796
-