Analysis
-
max time kernel
128s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 16:45
Static task
static1
Behavioral task
behavioral1
Sample
41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe
Resource
win10v2004-20220414-en
General
-
Target
41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe
-
Size
1005KB
-
MD5
076858b623a8627a598e7f0ce215a950
-
SHA1
9024597820f92fbe80387c2c29a3ef07c801b9ca
-
SHA256
41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62
-
SHA512
12defd0b32a8ac8b70627bef40c77b7f01cad4e62f2ef816bfd752684486ff396c1e1e87c49b4583492b654151e8f64f5e98bcf8173a4db337afbcd7337bd387
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2584-134-0x0000000000B00000-0x0000000000B86000-memory.dmp family_masslogger behavioral2/memory/2584-133-0x0000000000B00000-0x0000000000B86000-memory.dmp family_masslogger -
Suspicious use of SetThreadContext 1 IoCs
Processes:
41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exedescription pid process target process PID 1688 set thread context of 2584 1688 41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe 41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exepid process 1688 41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe 1688 41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exepid process 1688 41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exedescription pid process target process PID 1688 wrote to memory of 2584 1688 41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe 41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe PID 1688 wrote to memory of 2584 1688 41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe 41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe PID 1688 wrote to memory of 2584 1688 41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe 41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe"C:\Users\Admin\AppData\Local\Temp\41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe"C:\Users\Admin\AppData\Local\Temp\41e8fe852c783b5c153b6524cc6d7e1c7977c8ebc83d846190f83c1fcf38df62.exe"2⤵PID:2584