Analysis
-
max time kernel
105s -
max time network
110s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
17-07-2020 05:30
Static task
static1
Behavioral task
behavioral1
Sample
dlWs3KImcASZUXb.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
dlWs3KImcASZUXb.exe
Resource
win10
General
-
Target
dlWs3KImcASZUXb.exe
-
Size
1.3MB
-
MD5
65510953a3e244a740560d58097b4516
-
SHA1
8acf08ecac72cfcef6591004fa8c8188628bd939
-
SHA256
1db65284dd73545215b9db3834b16709bf5bf5c33a417c38a205d09317cd6d0d
-
SHA512
b45dc5bd4b2822854d83df1daeeb14e17952bc3b7c2c4bd7c72a864dab9067121055a823aea52fb56f14f0bd5c85979fad9ff3170af87e23e41a8706f953660d
Malware Config
Extracted
C:\Users\Admin\AppData\Local\C8A579F880\Log.txt
masslogger
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1884 dlWs3KImcASZUXb.exe -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1884 dlWs3KImcASZUXb.exe 1884 dlWs3KImcASZUXb.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1884 dlWs3KImcASZUXb.exe -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1864 schtasks.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1864 1388 dlWs3KImcASZUXb.exe 26 PID 1388 wrote to memory of 1864 1388 dlWs3KImcASZUXb.exe 26 PID 1388 wrote to memory of 1864 1388 dlWs3KImcASZUXb.exe 26 PID 1388 wrote to memory of 1864 1388 dlWs3KImcASZUXb.exe 26 PID 1388 wrote to memory of 1884 1388 dlWs3KImcASZUXb.exe 28 PID 1388 wrote to memory of 1884 1388 dlWs3KImcASZUXb.exe 28 PID 1388 wrote to memory of 1884 1388 dlWs3KImcASZUXb.exe 28 PID 1388 wrote to memory of 1884 1388 dlWs3KImcASZUXb.exe 28 PID 1388 wrote to memory of 1884 1388 dlWs3KImcASZUXb.exe 28 PID 1388 wrote to memory of 1884 1388 dlWs3KImcASZUXb.exe 28 PID 1388 wrote to memory of 1884 1388 dlWs3KImcASZUXb.exe 28 PID 1388 wrote to memory of 1884 1388 dlWs3KImcASZUXb.exe 28 PID 1388 wrote to memory of 1884 1388 dlWs3KImcASZUXb.exe 28 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1388 set thread context of 1884 1388 dlWs3KImcASZUXb.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1884 dlWs3KImcASZUXb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dlWs3KImcASZUXb.exe"C:\Users\Admin\AppData\Local\Temp\dlWs3KImcASZUXb.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1388 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xWXaGdJkersk" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA0B1.tmp"2⤵
- Creates scheduled task(s)
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\dlWs3KImcASZUXb.exe"{path}"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:1884
-