Analysis
-
max time kernel
91s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
27-03-2022 21:25
Static task
static1
Behavioral task
behavioral1
Sample
3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe
Resource
win10v2004-20220331-en
General
-
Target
3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe
-
Size
1.1MB
-
MD5
d05e77f3861b02d2b85bee2fd3e1bd2f
-
SHA1
4bcbf42787afee482a7e30f12f3394803fdefc86
-
SHA256
3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971
-
SHA512
7a5e30ab5d4ebf9577c70a82f30a9d7f507d60c5f252b8d2c33747fa059f7f89810a6a8e4e6097cfe9b096657b7096063840bad7bf9293ddd706be58eecd948d
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1300-129-0x0000000000B90000-0x0000000000C16000-memory.dmp family_masslogger behavioral2/memory/1300-128-0x0000000000B90000-0x0000000000C16000-memory.dmp family_masslogger -
Drops startup file 1 IoCs
Processes:
notepad.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HHHHHHHHHHH.vbs notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exedescription pid process target process PID 736 set thread context of 1300 736 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exepowershell.exepid process 736 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe 736 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe 1300 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe 1300 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe 904 powershell.exe 904 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exepid process 736 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exepowershell.exedescription pid process Token: SeDebugPrivilege 1300 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe Token: SeDebugPrivilege 904 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exedescription pid process target process PID 736 wrote to memory of 1132 736 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe notepad.exe PID 736 wrote to memory of 1132 736 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe notepad.exe PID 736 wrote to memory of 1132 736 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe notepad.exe PID 736 wrote to memory of 1132 736 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe notepad.exe PID 736 wrote to memory of 1132 736 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe notepad.exe PID 736 wrote to memory of 1300 736 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe PID 736 wrote to memory of 1300 736 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe PID 736 wrote to memory of 1300 736 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe PID 1300 wrote to memory of 904 1300 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe powershell.exe PID 1300 wrote to memory of 904 1300 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe powershell.exe PID 1300 wrote to memory of 904 1300 3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe"C:\Users\Admin\AppData\Local\Temp\3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Drops startup file
PID:1132
-
-
C:\Users\Admin\AppData\Local\Temp\3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe"C:\Users\Admin\AppData\Local\Temp\3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\3a3606d38bd55a8a0c627f22f38ed873744e6fe62af75766dbe4707f68fe8971.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:904
-
-