Analysis
-
max time kernel
78s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
10-05-2022 19:15
Static task
static1
Behavioral task
behavioral1
Sample
282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe
Resource
win10v2004-20220414-en
General
-
Target
282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe
-
Size
987KB
-
MD5
0ced1954e108922776299f72f9f753a9
-
SHA1
7b7a7ad5cdfbdabc75dae2da28f291fef7d85740
-
SHA256
282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600
-
SHA512
eeca6bbca568c94fd935c1ad6e26fc8f6728737f6443bdfd4f51a9fde72a594595bb7c39ad20eb91881968e9d6de4dc49bebe8bfeaa0796701a5682ce22a70e4
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4092-135-0x0000000000B70000-0x0000000000BF6000-memory.dmp family_masslogger behavioral2/memory/4092-134-0x0000000000B70000-0x0000000000BF6000-memory.dmp family_masslogger -
Drops startup file 1 IoCs
Processes:
notepad.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wowowow.vbs notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exedescription pid process target process PID 5068 set thread context of 4092 5068 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exepowershell.exepid process 5068 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe 5068 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe 4092 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe 4092 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe 4920 powershell.exe 4920 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exepid process 5068 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exepowershell.exedescription pid process Token: SeDebugPrivilege 4092 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe Token: SeDebugPrivilege 4920 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exedescription pid process target process PID 5068 wrote to memory of 1916 5068 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe notepad.exe PID 5068 wrote to memory of 1916 5068 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe notepad.exe PID 5068 wrote to memory of 1916 5068 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe notepad.exe PID 5068 wrote to memory of 1916 5068 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe notepad.exe PID 5068 wrote to memory of 1916 5068 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe notepad.exe PID 5068 wrote to memory of 4092 5068 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe PID 5068 wrote to memory of 4092 5068 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe PID 5068 wrote to memory of 4092 5068 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe PID 4092 wrote to memory of 4920 4092 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe powershell.exe PID 4092 wrote to memory of 4920 4092 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe powershell.exe PID 4092 wrote to memory of 4920 4092 282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe"C:\Users\Admin\AppData\Local\Temp\282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Drops startup file
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe"C:\Users\Admin\AppData\Local\Temp\282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\282205512cc88189b523d3a7dd187ebf548e5771f110acb55ebf507b01f3e600.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920