Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14-04-2022 13:35
Static task
static1
Behavioral task
behavioral1
Sample
3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe
Resource
win10v2004-20220310-en
General
-
Target
3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe
-
Size
1.1MB
-
MD5
0926c811a25166772fe8e5b851111ac0
-
SHA1
3dd43c9f30d385c375303cba97bca5ee5f136a2a
-
SHA256
3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c
-
SHA512
6092b0b0b15409b09f9b4ee29ee7efbf2021a08895247232112b5aff87568ed493472939939673c2d23dde535febd5758ff55bd58fc740c0176a20094cddd5fd
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1588-71-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1588-72-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1588-74-0x00000000004813DE-mapping.dmp family_masslogger behavioral1/memory/1588-73-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1588-77-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1588-79-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger -
Executes dropped EXE 2 IoCs
Processes:
hikarvin.exehikarvin.exepid process 1500 hikarvin.exe 1588 hikarvin.exe -
Drops startup file 1 IoCs
Processes:
hikarvin.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hikarvin.lnk hikarvin.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exehikarvin.exepid process 276 cmd.exe 1500 hikarvin.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
hikarvin.exedescription pid process target process PID 1500 set thread context of 1588 1500 hikarvin.exe hikarvin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exehikarvin.exehikarvin.exepid process 1376 3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe 1500 hikarvin.exe 1588 hikarvin.exe 1588 hikarvin.exe 1500 hikarvin.exe 1500 hikarvin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exehikarvin.exehikarvin.exedescription pid process Token: SeDebugPrivilege 1376 3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe Token: SeDebugPrivilege 1500 hikarvin.exe Token: SeDebugPrivilege 1588 hikarvin.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.execmd.exehikarvin.exedescription pid process target process PID 1376 wrote to memory of 580 1376 3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe cmd.exe PID 1376 wrote to memory of 580 1376 3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe cmd.exe PID 1376 wrote to memory of 580 1376 3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe cmd.exe PID 1376 wrote to memory of 580 1376 3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe cmd.exe PID 1376 wrote to memory of 276 1376 3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe cmd.exe PID 1376 wrote to memory of 276 1376 3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe cmd.exe PID 1376 wrote to memory of 276 1376 3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe cmd.exe PID 1376 wrote to memory of 276 1376 3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe cmd.exe PID 276 wrote to memory of 1500 276 cmd.exe hikarvin.exe PID 276 wrote to memory of 1500 276 cmd.exe hikarvin.exe PID 276 wrote to memory of 1500 276 cmd.exe hikarvin.exe PID 276 wrote to memory of 1500 276 cmd.exe hikarvin.exe PID 1500 wrote to memory of 1588 1500 hikarvin.exe hikarvin.exe PID 1500 wrote to memory of 1588 1500 hikarvin.exe hikarvin.exe PID 1500 wrote to memory of 1588 1500 hikarvin.exe hikarvin.exe PID 1500 wrote to memory of 1588 1500 hikarvin.exe hikarvin.exe PID 1500 wrote to memory of 1588 1500 hikarvin.exe hikarvin.exe PID 1500 wrote to memory of 1588 1500 hikarvin.exe hikarvin.exe PID 1500 wrote to memory of 1588 1500 hikarvin.exe hikarvin.exe PID 1500 wrote to memory of 1588 1500 hikarvin.exe hikarvin.exe PID 1500 wrote to memory of 1588 1500 hikarvin.exe hikarvin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe"C:\Users\Admin\AppData\Local\Temp\3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\3d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\hikarvin.exe"2⤵PID:580
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\hikarvin.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\hikarvin.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\hikarvin.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\hikarvin.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\hikarvin.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50926c811a25166772fe8e5b851111ac0
SHA13dd43c9f30d385c375303cba97bca5ee5f136a2a
SHA2563d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c
SHA5126092b0b0b15409b09f9b4ee29ee7efbf2021a08895247232112b5aff87568ed493472939939673c2d23dde535febd5758ff55bd58fc740c0176a20094cddd5fd
-
Filesize
1.1MB
MD50926c811a25166772fe8e5b851111ac0
SHA13dd43c9f30d385c375303cba97bca5ee5f136a2a
SHA2563d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c
SHA5126092b0b0b15409b09f9b4ee29ee7efbf2021a08895247232112b5aff87568ed493472939939673c2d23dde535febd5758ff55bd58fc740c0176a20094cddd5fd
-
Filesize
1.1MB
MD50926c811a25166772fe8e5b851111ac0
SHA13dd43c9f30d385c375303cba97bca5ee5f136a2a
SHA2563d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c
SHA5126092b0b0b15409b09f9b4ee29ee7efbf2021a08895247232112b5aff87568ed493472939939673c2d23dde535febd5758ff55bd58fc740c0176a20094cddd5fd
-
Filesize
1.1MB
MD50926c811a25166772fe8e5b851111ac0
SHA13dd43c9f30d385c375303cba97bca5ee5f136a2a
SHA2563d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c
SHA5126092b0b0b15409b09f9b4ee29ee7efbf2021a08895247232112b5aff87568ed493472939939673c2d23dde535febd5758ff55bd58fc740c0176a20094cddd5fd
-
Filesize
1.1MB
MD50926c811a25166772fe8e5b851111ac0
SHA13dd43c9f30d385c375303cba97bca5ee5f136a2a
SHA2563d651f6264da7ba84b71f9495f815b26254a4d3085760c5d97b40d40a998d02c
SHA5126092b0b0b15409b09f9b4ee29ee7efbf2021a08895247232112b5aff87568ed493472939939673c2d23dde535febd5758ff55bd58fc740c0176a20094cddd5fd