Analysis
-
max time kernel
139s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 23:17
Static task
static1
Behavioral task
behavioral1
Sample
Ziraat Bankasi Swift.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Ziraat Bankasi Swift.exe
Resource
win10v2004-20220414-en
General
-
Target
Ziraat Bankasi Swift.exe
-
Size
676KB
-
MD5
dc0c0581231219dbd8c51210499ed5f4
-
SHA1
0f185c40acced956c10fbad1ee52950b72618db8
-
SHA256
1807db4729b2057e9e43ceefc3502ebd7a988e248ede3c56d85f7f5befdafd06
-
SHA512
5bcc5849043c7d4b316a621018705cc20f920e0e92ebe3a96f4b997aa2b3fd2f1f2e4796b69737ca5696060f6adbb0ab492be3e66fc0e7a4d5b15cac2e2e8aea
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 32 IoCs
Processes:
resource yara_rule behavioral1/memory/1916-62-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-63-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-65-0x00000000004A18CE-mapping.dmp family_masslogger behavioral1/memory/1916-64-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-67-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-69-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-72-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-74-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-76-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-78-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-80-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-84-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-82-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-90-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-88-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-86-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-92-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-94-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-96-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-98-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-104-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-102-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-100-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-106-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-110-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-108-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-114-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-116-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-112-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-118-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-120-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1916-122-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Ziraat Bankasi Swift.exedescription pid process target process PID 844 set thread context of 1916 844 Ziraat Bankasi Swift.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1764 1916 WerFault.exe AppLaunch.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
AppLaunch.exepid process 1916 AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
Ziraat Bankasi Swift.exeAppLaunch.exepid process 844 Ziraat Bankasi Swift.exe 844 Ziraat Bankasi Swift.exe 844 Ziraat Bankasi Swift.exe 844 Ziraat Bankasi Swift.exe 844 Ziraat Bankasi Swift.exe 844 Ziraat Bankasi Swift.exe 844 Ziraat Bankasi Swift.exe 844 Ziraat Bankasi Swift.exe 1916 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Ziraat Bankasi Swift.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 844 Ziraat Bankasi Swift.exe Token: SeDebugPrivilege 1916 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
AppLaunch.exepid process 1916 AppLaunch.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
Ziraat Bankasi Swift.exeAppLaunch.exedescription pid process target process PID 844 wrote to memory of 1916 844 Ziraat Bankasi Swift.exe AppLaunch.exe PID 844 wrote to memory of 1916 844 Ziraat Bankasi Swift.exe AppLaunch.exe PID 844 wrote to memory of 1916 844 Ziraat Bankasi Swift.exe AppLaunch.exe PID 844 wrote to memory of 1916 844 Ziraat Bankasi Swift.exe AppLaunch.exe PID 844 wrote to memory of 1916 844 Ziraat Bankasi Swift.exe AppLaunch.exe PID 844 wrote to memory of 1916 844 Ziraat Bankasi Swift.exe AppLaunch.exe PID 844 wrote to memory of 1916 844 Ziraat Bankasi Swift.exe AppLaunch.exe PID 844 wrote to memory of 1916 844 Ziraat Bankasi Swift.exe AppLaunch.exe PID 844 wrote to memory of 1916 844 Ziraat Bankasi Swift.exe AppLaunch.exe PID 844 wrote to memory of 1916 844 Ziraat Bankasi Swift.exe AppLaunch.exe PID 844 wrote to memory of 1916 844 Ziraat Bankasi Swift.exe AppLaunch.exe PID 844 wrote to memory of 1916 844 Ziraat Bankasi Swift.exe AppLaunch.exe PID 1916 wrote to memory of 1764 1916 AppLaunch.exe WerFault.exe PID 1916 wrote to memory of 1764 1916 AppLaunch.exe WerFault.exe PID 1916 wrote to memory of 1764 1916 AppLaunch.exe WerFault.exe PID 1916 wrote to memory of 1764 1916 AppLaunch.exe WerFault.exe PID 1916 wrote to memory of 1764 1916 AppLaunch.exe WerFault.exe PID 1916 wrote to memory of 1764 1916 AppLaunch.exe WerFault.exe PID 1916 wrote to memory of 1764 1916 AppLaunch.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift.exe"C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 14283⤵
- Program crash
PID:1764