Analysis
-
max time kernel
114s -
max time network
154s -
platform
windows7_x64 -
resource
win7 -
submitted
17/07/2020, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
uhsBKFwa7Uzvntn.exe
Resource
win7
Behavioral task
behavioral2
Sample
uhsBKFwa7Uzvntn.exe
Resource
win10v200430
General
-
Target
uhsBKFwa7Uzvntn.exe
-
Size
1.6MB
-
MD5
0892d8ff956c6ffddc0634cdb8c513f2
-
SHA1
9fa325cca370fbd86baaf5b0b3a6cbf2d3032f8a
-
SHA256
1146e4d995c67932f70852ddd73410efbf0ecfbe227fa9834ec7dfea12cb6097
-
SHA512
be353d188fe1f07229f46418bb76c82085ba23ed749a3dc66ea10bc46a64d756d4c21c37394f1c02609ed01efecf606dc23327d3b872e4faf17f579bb1bf165b
Malware Config
Extracted
C:\Users\Admin\AppData\Local\E2C1E8F1FA\Log.txt
masslogger
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1840 uhsBKFwa7Uzvntn.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1840 uhsBKFwa7Uzvntn.exe 1840 uhsBKFwa7Uzvntn.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1840 uhsBKFwa7Uzvntn.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1840 uhsBKFwa7Uzvntn.exe -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 608 wrote to memory of 1868 608 uhsBKFwa7Uzvntn.exe 26 PID 608 wrote to memory of 1868 608 uhsBKFwa7Uzvntn.exe 26 PID 608 wrote to memory of 1868 608 uhsBKFwa7Uzvntn.exe 26 PID 608 wrote to memory of 1868 608 uhsBKFwa7Uzvntn.exe 26 PID 608 wrote to memory of 1840 608 uhsBKFwa7Uzvntn.exe 28 PID 608 wrote to memory of 1840 608 uhsBKFwa7Uzvntn.exe 28 PID 608 wrote to memory of 1840 608 uhsBKFwa7Uzvntn.exe 28 PID 608 wrote to memory of 1840 608 uhsBKFwa7Uzvntn.exe 28 PID 608 wrote to memory of 1840 608 uhsBKFwa7Uzvntn.exe 28 PID 608 wrote to memory of 1840 608 uhsBKFwa7Uzvntn.exe 28 PID 608 wrote to memory of 1840 608 uhsBKFwa7Uzvntn.exe 28 PID 608 wrote to memory of 1840 608 uhsBKFwa7Uzvntn.exe 28 PID 608 wrote to memory of 1840 608 uhsBKFwa7Uzvntn.exe 28 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 608 set thread context of 1840 608 uhsBKFwa7Uzvntn.exe 28 -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1868 schtasks.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org
Processes
-
C:\Users\Admin\AppData\Local\Temp\uhsBKFwa7Uzvntn.exe"C:\Users\Admin\AppData\Local\Temp\uhsBKFwa7Uzvntn.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:608 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BmatPXnSR" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3033.tmp"2⤵
- Creates scheduled task(s)
PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\uhsBKFwa7Uzvntn.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
PID:1840
-