Analysis
-
max time kernel
164s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 13:01
Static task
static1
Behavioral task
behavioral1
Sample
49b64249d56b43b7e92112ebde5e20d9ae67cd88a2fa1d856eed251fc328cefb.zip
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
49b64249d56b43b7e92112ebde5e20d9ae67cd88a2fa1d856eed251fc328cefb.zip
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
DESIGNS ARTWORK FOR ORDER.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
DESIGNS ARTWORK FOR ORDER.exe
Resource
win10v2004-20220414-en
General
-
Target
DESIGNS ARTWORK FOR ORDER.exe
-
Size
867KB
-
MD5
73b302dc6804f0099e0957150f7a5782
-
SHA1
c6cc6631668f0f8132651bd01dd4ca0303dd5fb1
-
SHA256
0b59a5ffd1da84a9bf88fc0c49d758fb8288f1e9564111ec5c4f8e0ffa91940d
-
SHA512
81f8751498372369f7dcdeb8a16a8d4a3460dfe64a59e1ec703a1f2a71e53d322ecd32b7a47039ee03f0628132b164806aef522a2ddd97013b41e2c32a3b61d3
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 1 IoCs
Processes:
resource yara_rule behavioral4/memory/4404-135-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DESIGNS ARTWORK FOR ORDER.exedescription pid process target process PID 2964 set thread context of 4404 2964 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
DESIGNS ARTWORK FOR ORDER.exeDESIGNS ARTWORK FOR ORDER.exepowershell.exepid process 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 2964 DESIGNS ARTWORK FOR ORDER.exe 4404 DESIGNS ARTWORK FOR ORDER.exe 4404 DESIGNS ARTWORK FOR ORDER.exe 3192 powershell.exe 3192 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
DESIGNS ARTWORK FOR ORDER.exeDESIGNS ARTWORK FOR ORDER.exepowershell.exedescription pid process Token: SeDebugPrivilege 2964 DESIGNS ARTWORK FOR ORDER.exe Token: SeDebugPrivilege 4404 DESIGNS ARTWORK FOR ORDER.exe Token: SeDebugPrivilege 3192 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
DESIGNS ARTWORK FOR ORDER.exeDESIGNS ARTWORK FOR ORDER.execmd.exedescription pid process target process PID 2964 wrote to memory of 4404 2964 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe PID 2964 wrote to memory of 4404 2964 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe PID 2964 wrote to memory of 4404 2964 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe PID 2964 wrote to memory of 4404 2964 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe PID 2964 wrote to memory of 4404 2964 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe PID 2964 wrote to memory of 4404 2964 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe PID 2964 wrote to memory of 4404 2964 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe PID 2964 wrote to memory of 4404 2964 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe PID 4404 wrote to memory of 2364 4404 DESIGNS ARTWORK FOR ORDER.exe cmd.exe PID 4404 wrote to memory of 2364 4404 DESIGNS ARTWORK FOR ORDER.exe cmd.exe PID 4404 wrote to memory of 2364 4404 DESIGNS ARTWORK FOR ORDER.exe cmd.exe PID 2364 wrote to memory of 3192 2364 cmd.exe powershell.exe PID 2364 wrote to memory of 3192 2364 cmd.exe powershell.exe PID 2364 wrote to memory of 3192 2364 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DESIGNS ARTWORK FOR ORDER.exe"C:\Users\Admin\AppData\Local\Temp\DESIGNS ARTWORK FOR ORDER.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\DESIGNS ARTWORK FOR ORDER.exe"C:\Users\Admin\AppData\Local\Temp\DESIGNS ARTWORK FOR ORDER.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\DESIGNS ARTWORK FOR ORDER.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\DESIGNS ARTWORK FOR ORDER.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3192