Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 13:23
Static task
static1
Behavioral task
behavioral1
Sample
SKM_C3350191107102300.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SKM_C3350191107102300.exe
Resource
win10v2004-20220414-en
General
-
Target
SKM_C3350191107102300.exe
-
Size
1.3MB
-
MD5
4509f8b27545e3a27ee3bc66df679b7c
-
SHA1
0b3687916e09fdf8528e06670ab6ba7b0b72fdf3
-
SHA256
15d49746815865a2bc0eb51c3479cf49a1e3cff398479a31c935d1cfbb64d5f0
-
SHA512
f77331f04e958ba87a4ba1b927d28058ce382242bf2242636bf9e96101b4ac43ca49c557744d7a7df6a35ea7c314101ae40491edde643aa8894d656873d93d92
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3856-132-0x0000000000000000-mapping.dmp family_masslogger behavioral2/memory/3856-133-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SKM_C3350191107102300.exedescription pid process target process PID 4976 set thread context of 3856 4976 SKM_C3350191107102300.exe RegSvcs.ExE -
Drops file in Windows directory 1 IoCs
Processes:
dw20.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
dw20.exedescription pid process Token: SeRestorePrivilege 1416 dw20.exe Token: SeBackupPrivilege 1416 dw20.exe Token: SeBackupPrivilege 1416 dw20.exe Token: SeBackupPrivilege 1416 dw20.exe Token: SeBackupPrivilege 1416 dw20.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SKM_C3350191107102300.exepid process 4976 SKM_C3350191107102300.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
SKM_C3350191107102300.exeRegSvcs.ExEdescription pid process target process PID 4976 wrote to memory of 3856 4976 SKM_C3350191107102300.exe RegSvcs.ExE PID 4976 wrote to memory of 3856 4976 SKM_C3350191107102300.exe RegSvcs.ExE PID 4976 wrote to memory of 3856 4976 SKM_C3350191107102300.exe RegSvcs.ExE PID 4976 wrote to memory of 3856 4976 SKM_C3350191107102300.exe RegSvcs.ExE PID 4976 wrote to memory of 3856 4976 SKM_C3350191107102300.exe RegSvcs.ExE PID 4976 wrote to memory of 3856 4976 SKM_C3350191107102300.exe RegSvcs.ExE PID 4976 wrote to memory of 3856 4976 SKM_C3350191107102300.exe RegSvcs.ExE PID 4976 wrote to memory of 3856 4976 SKM_C3350191107102300.exe RegSvcs.ExE PID 3856 wrote to memory of 1416 3856 RegSvcs.ExE dw20.exe PID 3856 wrote to memory of 1416 3856 RegSvcs.ExE dw20.exe PID 3856 wrote to memory of 1416 3856 RegSvcs.ExE dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKM_C3350191107102300.exe"C:\Users\Admin\AppData\Local\Temp\SKM_C3350191107102300.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.ExE"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.ExE"2⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7643⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1416