Analysis
-
max time kernel
189s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 06:29
Static task
static1
Behavioral task
behavioral1
Sample
7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe
Resource
win10v2004-20220414-en
General
-
Target
7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe
-
Size
956KB
-
MD5
61d1229b0d488254e427690371417bad
-
SHA1
a5b44ab6d137d29a46b38926b95c6d3c70fb6c8d
-
SHA256
7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74
-
SHA512
5f865181f4b1d683c51f5e044f12be4987a3fbf4047d7f424f7805f3d350298f0b889910f9be423f5b8a5912dd137dced5f9e4c84575199edfd73d28d1ff1b27
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5104-136-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exedescription pid process target process PID 4412 set thread context of 5104 4412 7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exeMSBuild.exepowershell.exepid process 4412 7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe 4412 7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe 4412 7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe 5104 MSBuild.exe 5104 MSBuild.exe 460 powershell.exe 460 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exeMSBuild.exepowershell.exedescription pid process Token: SeDebugPrivilege 4412 7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe Token: SeDebugPrivilege 5104 MSBuild.exe Token: SeDebugPrivilege 460 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exeMSBuild.exedescription pid process target process PID 4412 wrote to memory of 5104 4412 7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe MSBuild.exe PID 4412 wrote to memory of 5104 4412 7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe MSBuild.exe PID 4412 wrote to memory of 5104 4412 7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe MSBuild.exe PID 4412 wrote to memory of 5104 4412 7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe MSBuild.exe PID 4412 wrote to memory of 5104 4412 7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe MSBuild.exe PID 4412 wrote to memory of 5104 4412 7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe MSBuild.exe PID 4412 wrote to memory of 5104 4412 7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe MSBuild.exe PID 4412 wrote to memory of 5104 4412 7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe MSBuild.exe PID 5104 wrote to memory of 460 5104 MSBuild.exe powershell.exe PID 5104 wrote to memory of 460 5104 MSBuild.exe powershell.exe PID 5104 wrote to memory of 460 5104 MSBuild.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe"C:\Users\Admin\AppData\Local\Temp\7cd8e8bdf19cbdf511d7807ff8233413c544efeb9518e2171a4151790e9d2f74.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 2; Remove-Item -path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:460