Analysis
-
max time kernel
19s -
max time network
105s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-12-2020 12:19
Static task
static1
Behavioral task
behavioral1
Sample
TIRNAK.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
TIRNAK.exe
Resource
win10v20201028
General
-
Target
TIRNAK.exe
-
Size
29KB
-
MD5
2cb0cf48d5eafbd16bbf8cdda749d628
-
SHA1
1b71449f295eae0994f4d62de838b1af168c0a09
-
SHA256
e9575adae2fa6afb6b8d8fb098feec9d4acbadabda4beeca90433b578cd6afa1
-
SHA512
1f6e0be8e3c66aa8a1ac7e41b26b0b29bf055039c3bd8116cb33aa5874077c1325fcbfc0a934e2fdd6da89acea34b1cf2875147f0470346afeca7e9193d79927
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3764-12-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral2/memory/3764-13-0x000000000048184E-mapping.dmp family_masslogger -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
TIRNAK.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\TIRNAK.exe\"" TIRNAK.exe -
Deletes itself 1 IoCs
Processes:
powershell.exepid process 1388 powershell.exe -
Drops startup file 2 IoCs
Processes:
TIRNAK.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TIRNAK.exe TIRNAK.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TIRNAK.exe TIRNAK.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
TIRNAK.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\AppData\\Local\\Temp\\TIRNAK.exe" TIRNAK.exe Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\TIRNAK.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\TIRNAK.exe" TIRNAK.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
TIRNAK.exedescription pid process target process PID 652 set thread context of 3764 652 TIRNAK.exe TIRNAK.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2076 timeout.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
TIRNAK.exepowershell.exepid process 3764 TIRNAK.exe 3764 TIRNAK.exe 1388 powershell.exe 1388 powershell.exe 1388 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
TIRNAK.exeTIRNAK.exepowershell.exedescription pid process Token: SeDebugPrivilege 652 TIRNAK.exe Token: SeDebugPrivilege 3764 TIRNAK.exe Token: SeDebugPrivilege 1388 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
TIRNAK.execmd.exeTIRNAK.exedescription pid process target process PID 652 wrote to memory of 3480 652 TIRNAK.exe cmd.exe PID 652 wrote to memory of 3480 652 TIRNAK.exe cmd.exe PID 652 wrote to memory of 3480 652 TIRNAK.exe cmd.exe PID 3480 wrote to memory of 2076 3480 cmd.exe timeout.exe PID 3480 wrote to memory of 2076 3480 cmd.exe timeout.exe PID 3480 wrote to memory of 2076 3480 cmd.exe timeout.exe PID 652 wrote to memory of 3764 652 TIRNAK.exe TIRNAK.exe PID 652 wrote to memory of 3764 652 TIRNAK.exe TIRNAK.exe PID 652 wrote to memory of 3764 652 TIRNAK.exe TIRNAK.exe PID 652 wrote to memory of 3764 652 TIRNAK.exe TIRNAK.exe PID 652 wrote to memory of 3764 652 TIRNAK.exe TIRNAK.exe PID 652 wrote to memory of 3764 652 TIRNAK.exe TIRNAK.exe PID 652 wrote to memory of 3764 652 TIRNAK.exe TIRNAK.exe PID 652 wrote to memory of 3764 652 TIRNAK.exe TIRNAK.exe PID 3764 wrote to memory of 1388 3764 TIRNAK.exe powershell.exe PID 3764 wrote to memory of 1388 3764 TIRNAK.exe powershell.exe PID 3764 wrote to memory of 1388 3764 TIRNAK.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TIRNAK.exe"C:\Users\Admin\AppData\Local\Temp\TIRNAK.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 4.9032⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 4.9033⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\TIRNAK.exe"C:\Users\Admin\AppData\Local\Temp\TIRNAK.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\TIRNAK.exe'3⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TIRNAK.exe.logMD5
d567f19f34a4bb9387d89a16e0c18b6a
SHA1cfd95ea4d78455ea99aca178e3220a80af8a5abf
SHA2563ea54c0511a9b9ebd3c5242ac121fa76643e5492043987c8dc633cb47ee33f72
SHA512861e78011452f94120d9ee2f6c46845f1ff56c6b7a863a0ec17123c463364824677e0374ca259a456e2971542ba533943d0bc50979fcbe5160a52c404f3f5c27
-
memory/652-11-0x0000000007270000-0x0000000007271000-memory.dmpFilesize
4KB
-
memory/652-3-0x0000000000550000-0x0000000000551000-memory.dmpFilesize
4KB
-
memory/652-5-0x0000000004DA0000-0x0000000004DA1000-memory.dmpFilesize
4KB
-
memory/652-6-0x0000000005490000-0x0000000005491000-memory.dmpFilesize
4KB
-
memory/652-2-0x0000000073FF0000-0x00000000746DE000-memory.dmpFilesize
6.9MB
-
memory/652-9-0x0000000004820000-0x00000000048B4000-memory.dmpFilesize
592KB
-
memory/652-10-0x00000000072A0000-0x00000000072A1000-memory.dmpFilesize
4KB
-
memory/1388-21-0x0000000000000000-mapping.dmp
-
memory/1388-29-0x0000000007950000-0x0000000007951000-memory.dmpFilesize
4KB
-
memory/1388-35-0x0000000007440000-0x0000000007441000-memory.dmpFilesize
4KB
-
memory/1388-34-0x0000000009960000-0x0000000009961000-memory.dmpFilesize
4KB
-
memory/1388-33-0x0000000009560000-0x0000000009561000-memory.dmpFilesize
4KB
-
memory/1388-32-0x0000000009FE0000-0x0000000009FE1000-memory.dmpFilesize
4KB
-
memory/1388-31-0x0000000008930000-0x0000000008931000-memory.dmpFilesize
4KB
-
memory/1388-22-0x0000000074070000-0x000000007475E000-memory.dmpFilesize
6.9MB
-
memory/1388-23-0x0000000004D90000-0x0000000004D91000-memory.dmpFilesize
4KB
-
memory/1388-24-0x0000000007970000-0x0000000007971000-memory.dmpFilesize
4KB
-
memory/1388-25-0x00000000077E0000-0x00000000077E1000-memory.dmpFilesize
4KB
-
memory/1388-26-0x0000000007880000-0x0000000007881000-memory.dmpFilesize
4KB
-
memory/1388-28-0x00000000082F0000-0x00000000082F1000-memory.dmpFilesize
4KB
-
memory/1388-30-0x0000000008640000-0x0000000008641000-memory.dmpFilesize
4KB
-
memory/2076-8-0x0000000000000000-mapping.dmp
-
memory/3480-7-0x0000000000000000-mapping.dmp
-
memory/3764-12-0x0000000000400000-0x0000000000486000-memory.dmpFilesize
536KB
-
memory/3764-20-0x0000000005950000-0x0000000005951000-memory.dmpFilesize
4KB
-
memory/3764-15-0x0000000073FF0000-0x00000000746DE000-memory.dmpFilesize
6.9MB
-
memory/3764-13-0x000000000048184E-mapping.dmp