Analysis
-
max time kernel
151s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
02-05-2022 15:31
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Doc 3454.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Shipping Doc 3454.exe
Resource
win10v2004-20220414-en
General
-
Target
Shipping Doc 3454.exe
-
Size
970KB
-
MD5
ff65414919a5ca429bd872a4f5ae696a
-
SHA1
3cbfcdb8b5f7bcab7bd09125627228bee497faba
-
SHA256
4b174227ea49d30f3378e8469d9849015779d6d3da73333ad0b386411bfade20
-
SHA512
6177b8c413aa14ad5ec49b9b71a59d89a53ffc10dcdb2a76a8ec64cdfe3541776f841f501da04d6aad1a7c64c4a44904f5f30bb6051feb2c3a5bc51d12c2e0cd
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 1 IoCs
resource yara_rule behavioral2/memory/3832-140-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3656 set thread context of 3832 3656 Shipping Doc 3454.exe 88 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3656 Shipping Doc 3454.exe 3656 Shipping Doc 3454.exe 3656 Shipping Doc 3454.exe 3656 Shipping Doc 3454.exe 3656 Shipping Doc 3454.exe 3656 Shipping Doc 3454.exe 3832 Shipping Doc 3454.exe 3832 Shipping Doc 3454.exe 1408 powershell.exe 1408 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3656 Shipping Doc 3454.exe Token: SeDebugPrivilege 3832 Shipping Doc 3454.exe Token: SeDebugPrivilege 1408 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3656 wrote to memory of 2032 3656 Shipping Doc 3454.exe 85 PID 3656 wrote to memory of 2032 3656 Shipping Doc 3454.exe 85 PID 3656 wrote to memory of 2032 3656 Shipping Doc 3454.exe 85 PID 3656 wrote to memory of 2416 3656 Shipping Doc 3454.exe 86 PID 3656 wrote to memory of 2416 3656 Shipping Doc 3454.exe 86 PID 3656 wrote to memory of 2416 3656 Shipping Doc 3454.exe 86 PID 3656 wrote to memory of 3644 3656 Shipping Doc 3454.exe 87 PID 3656 wrote to memory of 3644 3656 Shipping Doc 3454.exe 87 PID 3656 wrote to memory of 3644 3656 Shipping Doc 3454.exe 87 PID 3656 wrote to memory of 3832 3656 Shipping Doc 3454.exe 88 PID 3656 wrote to memory of 3832 3656 Shipping Doc 3454.exe 88 PID 3656 wrote to memory of 3832 3656 Shipping Doc 3454.exe 88 PID 3656 wrote to memory of 3832 3656 Shipping Doc 3454.exe 88 PID 3656 wrote to memory of 3832 3656 Shipping Doc 3454.exe 88 PID 3656 wrote to memory of 3832 3656 Shipping Doc 3454.exe 88 PID 3656 wrote to memory of 3832 3656 Shipping Doc 3454.exe 88 PID 3656 wrote to memory of 3832 3656 Shipping Doc 3454.exe 88 PID 3832 wrote to memory of 1408 3832 Shipping Doc 3454.exe 89 PID 3832 wrote to memory of 1408 3832 Shipping Doc 3454.exe 89 PID 3832 wrote to memory of 1408 3832 Shipping Doc 3454.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping Doc 3454.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Doc 3454.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\Shipping Doc 3454.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Doc 3454.exe"2⤵PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\Shipping Doc 3454.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Doc 3454.exe"2⤵PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\Shipping Doc 3454.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Doc 3454.exe"2⤵PID:3644
-
-
C:\Users\Admin\AppData\Local\Temp\Shipping Doc 3454.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Doc 3454.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Shipping Doc 3454.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD517573558c4e714f606f997e5157afaac
SHA113e16e9415ceef429aaf124139671ebeca09ed23
SHA256c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553
SHA512f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc