Analysis
-
max time kernel
63s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
18-04-2022 11:05
Static task
static1
Behavioral task
behavioral1
Sample
525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe
Resource
win10v2004-20220414-en
General
-
Target
525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe
-
Size
627KB
-
MD5
4603fcb4d478d038f44c3deb950e4f5e
-
SHA1
b91ecd8439b30dabb43e2d7a0be880f4d70c45b1
-
SHA256
525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec
-
SHA512
2192dbc01f0a92c2787fff53bc4b766787f13d891df580392e2f6462745d991184fefa99b268870fae981a3a15779668ef3461693b6d05c6e6fc3c218e9d63d8
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4356-134-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger -
Suspicious use of SetThreadContext 1 IoCs
Processes:
525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exedescription pid process target process PID 1840 set thread context of 4356 1840 525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exeRegSvcs.exepowershell.exepid process 1840 525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe 1840 525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe 4356 RegSvcs.exe 4356 RegSvcs.exe 1356 powershell.exe 1356 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exeRegSvcs.exepowershell.exedescription pid process Token: SeDebugPrivilege 1840 525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe Token: SeDebugPrivilege 4356 RegSvcs.exe Token: SeDebugPrivilege 1356 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exeRegSvcs.exedescription pid process target process PID 1840 wrote to memory of 2360 1840 525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe RegSvcs.exe PID 1840 wrote to memory of 2360 1840 525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe RegSvcs.exe PID 1840 wrote to memory of 2360 1840 525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe RegSvcs.exe PID 1840 wrote to memory of 4356 1840 525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe RegSvcs.exe PID 1840 wrote to memory of 4356 1840 525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe RegSvcs.exe PID 1840 wrote to memory of 4356 1840 525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe RegSvcs.exe PID 1840 wrote to memory of 4356 1840 525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe RegSvcs.exe PID 1840 wrote to memory of 4356 1840 525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe RegSvcs.exe PID 1840 wrote to memory of 4356 1840 525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe RegSvcs.exe PID 1840 wrote to memory of 4356 1840 525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe RegSvcs.exe PID 1840 wrote to memory of 4356 1840 525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe RegSvcs.exe PID 4356 wrote to memory of 1356 4356 RegSvcs.exe powershell.exe PID 4356 wrote to memory of 1356 4356 RegSvcs.exe powershell.exe PID 4356 wrote to memory of 1356 4356 RegSvcs.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe"C:\Users\Admin\AppData\Local\Temp\525202de58e562f513d80eab1b53b4804a5afea6cf791f17084fa78b9de202ec.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2360
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 2; Remove-Item -path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-