Analysis
-
max time kernel
70s -
max time network
114s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
17-07-2020 16:34
Static task
static1
Behavioral task
behavioral1
Sample
MY_self_cryped.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
MY_self_cryped.exe
Resource
win10
General
-
Target
MY_self_cryped.exe
-
Size
1.2MB
-
MD5
cb0da230201048ec24ca733146c9d3ca
-
SHA1
fd5789a808f2d601640c591a47d2e7a31759d78f
-
SHA256
a543d22347f54870ae7dc14964a0242bfee089214c900abe01d1da6e2fcea6cc
-
SHA512
e3ce4a25725de7668d837a446b0978d2da51e50b591b28097f466c36ff9c42cb475ed58f4424cde31e99523dbaa12c3e7e1c8930a10eb9f5b90239651e28e7a8
Malware Config
Extracted
C:\Users\Admin\AppData\Local\C8A579F880\Log.txt
masslogger
Signatures
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1500 MY_self_cryped.exe Token: SeDebugPrivilege 1872 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1500 MY_self_cryped.exe 1500 MY_self_cryped.exe 1500 MY_self_cryped.exe 1872 RegAsm.exe -
Executes dropped EXE 1 IoCs
pid Process 1872 RegAsm.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org -
Loads dropped DLL 2 IoCs
pid Process 1500 MY_self_cryped.exe 1872 RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1500 wrote to memory of 1872 1500 MY_self_cryped.exe 26 PID 1500 wrote to memory of 1872 1500 MY_self_cryped.exe 26 PID 1500 wrote to memory of 1872 1500 MY_self_cryped.exe 26 PID 1500 wrote to memory of 1872 1500 MY_self_cryped.exe 26 PID 1500 wrote to memory of 1872 1500 MY_self_cryped.exe 26 PID 1500 wrote to memory of 1872 1500 MY_self_cryped.exe 26 PID 1500 wrote to memory of 1872 1500 MY_self_cryped.exe 26 PID 1500 wrote to memory of 1872 1500 MY_self_cryped.exe 26 PID 1500 wrote to memory of 1872 1500 MY_self_cryped.exe 26 PID 1500 wrote to memory of 1872 1500 MY_self_cryped.exe 26 PID 1500 wrote to memory of 1872 1500 MY_self_cryped.exe 26 PID 1500 wrote to memory of 1872 1500 MY_self_cryped.exe 26 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1500 set thread context of 1872 1500 MY_self_cryped.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\MY_self_cryped.exe"C:\Users\Admin\AppData\Local\Temp\MY_self_cryped.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
- Loads dropped DLL
PID:1872
-