Analysis
-
max time kernel
151s -
max time network
111s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
29-07-2020 06:24
Static task
static1
Behavioral task
behavioral1
Sample
LUSA TEX ORDER 07282020 .exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
LUSA TEX ORDER 07282020 .exe
Resource
win10
General
-
Target
LUSA TEX ORDER 07282020 .exe
-
Size
1.3MB
-
MD5
cbd2e0a042f3734b1b72543b3a55bd99
-
SHA1
e6b6ffe43795d6a4c6b3c60e1dbfe6b2d29333c6
-
SHA256
044c48fe42178958d8f55e5404e056ff0f1071d865deda9cc42518ab2c87fda7
-
SHA512
17a7f971ec908a19d0a0c8b9611caf7b0b3148a84723b3cf4d25d0a65b1a45341998a51286ad1dee31c9183010171311d4dd8c53ec603bfba61e37caedd8d10c
Malware Config
Extracted
C:\Users\Admin\AppData\Local\42EF15E83D\Log.txt
masslogger
Signatures
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1464 LUSA TEX ORDER 07282020 .exe Token: SeDebugPrivilege 648 LUSA TEX ORDER 07282020 .exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1852 1464 LUSA TEX ORDER 07282020 .exe 26 PID 1464 wrote to memory of 1852 1464 LUSA TEX ORDER 07282020 .exe 26 PID 1464 wrote to memory of 1852 1464 LUSA TEX ORDER 07282020 .exe 26 PID 1464 wrote to memory of 1852 1464 LUSA TEX ORDER 07282020 .exe 26 PID 1464 wrote to memory of 648 1464 LUSA TEX ORDER 07282020 .exe 28 PID 1464 wrote to memory of 648 1464 LUSA TEX ORDER 07282020 .exe 28 PID 1464 wrote to memory of 648 1464 LUSA TEX ORDER 07282020 .exe 28 PID 1464 wrote to memory of 648 1464 LUSA TEX ORDER 07282020 .exe 28 PID 1464 wrote to memory of 648 1464 LUSA TEX ORDER 07282020 .exe 28 PID 1464 wrote to memory of 648 1464 LUSA TEX ORDER 07282020 .exe 28 PID 1464 wrote to memory of 648 1464 LUSA TEX ORDER 07282020 .exe 28 PID 1464 wrote to memory of 648 1464 LUSA TEX ORDER 07282020 .exe 28 PID 1464 wrote to memory of 648 1464 LUSA TEX ORDER 07282020 .exe 28 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1464 set thread context of 648 1464 LUSA TEX ORDER 07282020 .exe 28 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 648 LUSA TEX ORDER 07282020 .exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1464 LUSA TEX ORDER 07282020 .exe 1464 LUSA TEX ORDER 07282020 .exe 648 LUSA TEX ORDER 07282020 .exe 648 LUSA TEX ORDER 07282020 .exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 648 LUSA TEX ORDER 07282020 .exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1852 schtasks.exe -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
Processes
-
C:\Users\Admin\AppData\Local\Temp\LUSA TEX ORDER 07282020 .exe"C:\Users\Admin\AppData\Local\Temp\LUSA TEX ORDER 07282020 .exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1464 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\&startupname&" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE954.tmp"2⤵
- Creates scheduled task(s)
PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\LUSA TEX ORDER 07282020 .exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:648
-