Analysis
-
max time kernel
45s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25-11-2020 12:22
Static task
static1
Behavioral task
behavioral1
Sample
41b90e096ee11fd8a4afc9dde7f95311.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
41b90e096ee11fd8a4afc9dde7f95311.exe
Resource
win10v20201028
General
-
Target
41b90e096ee11fd8a4afc9dde7f95311.exe
-
Size
525KB
-
MD5
41b90e096ee11fd8a4afc9dde7f95311
-
SHA1
53a53f95afeaaaa1af65b74a7caf394e246308b3
-
SHA256
31b06ca8f90f735bd3b209e576db1da2a5ab7f661b58f85eaabcde2181978003
-
SHA512
1b675a1fbed48ba951e69e7e2f8f6c38a303a5389ed5742f020321faaeb0bc8dbdeec2ca7dd946727898468a46e47468e784145889a34941b9642790c260305b
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/2584-10-0x0000000000486F3E-mapping.dmp family_masslogger behavioral2/memory/2584-9-0x0000000000400000-0x000000000048C000-memory.dmp family_masslogger behavioral2/memory/2584-16-0x0000000000486F3E-mapping.dmp family_masslogger behavioral2/memory/2584-18-0x0000000000486F3E-mapping.dmp family_masslogger behavioral2/memory/2584-17-0x0000000000486F3E-mapping.dmp family_masslogger behavioral2/memory/2584-19-0x0000000000486F3E-mapping.dmp family_masslogger behavioral2/memory/2584-20-0x0000000000486F3E-mapping.dmp family_masslogger -
ServiceHost packer 5 IoCs
Detects ServiceHost packer used for .NET malware
Processes:
resource yara_rule behavioral2/memory/2584-16-0x0000000000486F3E-mapping.dmp servicehost behavioral2/memory/2584-18-0x0000000000486F3E-mapping.dmp servicehost behavioral2/memory/2584-17-0x0000000000486F3E-mapping.dmp servicehost behavioral2/memory/2584-19-0x0000000000486F3E-mapping.dmp servicehost behavioral2/memory/2584-20-0x0000000000486F3E-mapping.dmp servicehost -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
41b90e096ee11fd8a4afc9dde7f95311.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\vlc = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\VideoLAN\\vlc.exe\"" 41b90e096ee11fd8a4afc9dde7f95311.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
41b90e096ee11fd8a4afc9dde7f95311.exedescription pid process target process PID 3980 set thread context of 2584 3980 41b90e096ee11fd8a4afc9dde7f95311.exe 41b90e096ee11fd8a4afc9dde7f95311.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2836 2584 WerFault.exe 41b90e096ee11fd8a4afc9dde7f95311.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe 2836 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
41b90e096ee11fd8a4afc9dde7f95311.exeWerFault.exedescription pid process Token: SeDebugPrivilege 3980 41b90e096ee11fd8a4afc9dde7f95311.exe Token: SeRestorePrivilege 2836 WerFault.exe Token: SeBackupPrivilege 2836 WerFault.exe Token: SeDebugPrivilege 2836 WerFault.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
41b90e096ee11fd8a4afc9dde7f95311.exedescription pid process target process PID 3980 wrote to memory of 2584 3980 41b90e096ee11fd8a4afc9dde7f95311.exe 41b90e096ee11fd8a4afc9dde7f95311.exe PID 3980 wrote to memory of 2584 3980 41b90e096ee11fd8a4afc9dde7f95311.exe 41b90e096ee11fd8a4afc9dde7f95311.exe PID 3980 wrote to memory of 2584 3980 41b90e096ee11fd8a4afc9dde7f95311.exe 41b90e096ee11fd8a4afc9dde7f95311.exe PID 3980 wrote to memory of 2584 3980 41b90e096ee11fd8a4afc9dde7f95311.exe 41b90e096ee11fd8a4afc9dde7f95311.exe PID 3980 wrote to memory of 2584 3980 41b90e096ee11fd8a4afc9dde7f95311.exe 41b90e096ee11fd8a4afc9dde7f95311.exe PID 3980 wrote to memory of 2584 3980 41b90e096ee11fd8a4afc9dde7f95311.exe 41b90e096ee11fd8a4afc9dde7f95311.exe PID 3980 wrote to memory of 2584 3980 41b90e096ee11fd8a4afc9dde7f95311.exe 41b90e096ee11fd8a4afc9dde7f95311.exe PID 3980 wrote to memory of 2584 3980 41b90e096ee11fd8a4afc9dde7f95311.exe 41b90e096ee11fd8a4afc9dde7f95311.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41b90e096ee11fd8a4afc9dde7f95311.exe"C:\Users\Admin\AppData\Local\Temp\41b90e096ee11fd8a4afc9dde7f95311.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\41b90e096ee11fd8a4afc9dde7f95311.exe"C:\Users\Admin\AppData\Local\Temp\41b90e096ee11fd8a4afc9dde7f95311.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 9403⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\41b90e096ee11fd8a4afc9dde7f95311.exe.logMD5
1755d02418241b16d29f6f19bb49952e
SHA155a2a978b98c43820f21a8b7597515d804e43d2c
SHA256ebeb444cf2bd1945e7be508cc782963cf8cf9cedb1680a776f41eb0bf763a561
SHA5126cd5449f39199e276ea335af0721384ba18009932c8eed5a36e43f1e08b0890291fb9d033aee8c6e8c88899a44504cb222404137ea6b0d847a49a14971f47c75
-
memory/2584-9-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/2584-20-0x0000000000486F3E-mapping.dmp
-
memory/2584-19-0x0000000000486F3E-mapping.dmp
-
memory/2584-17-0x0000000000486F3E-mapping.dmp
-
memory/2584-18-0x0000000000486F3E-mapping.dmp
-
memory/2584-16-0x0000000000486F3E-mapping.dmp
-
memory/2584-12-0x0000000073A20000-0x000000007410E000-memory.dmpFilesize
6.9MB
-
memory/2584-10-0x0000000000486F3E-mapping.dmp
-
memory/2836-15-0x0000000004650000-0x0000000004651000-memory.dmpFilesize
4KB
-
memory/3980-8-0x00000000097E0000-0x00000000097F6000-memory.dmpFilesize
88KB
-
memory/3980-7-0x0000000008F50000-0x0000000008F51000-memory.dmpFilesize
4KB
-
memory/3980-0-0x0000000073A20000-0x000000007410E000-memory.dmpFilesize
6.9MB
-
memory/3980-6-0x0000000008E40000-0x0000000008EDA000-memory.dmpFilesize
616KB
-
memory/3980-5-0x0000000005A10000-0x0000000005A11000-memory.dmpFilesize
4KB
-
memory/3980-4-0x00000000058B0000-0x00000000058B1000-memory.dmpFilesize
4KB
-
memory/3980-3-0x0000000005DB0000-0x0000000005DB1000-memory.dmpFilesize
4KB
-
memory/3980-1-0x0000000000FE0000-0x0000000000FE1000-memory.dmpFilesize
4KB