Analysis
-
max time kernel
141s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 14:32
Static task
static1
Behavioral task
behavioral1
Sample
wewewewe.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
wewewewe.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
wewewewe.exe
-
Size
1.4MB
-
MD5
029c7ec1040676551533408ef85d1f68
-
SHA1
9e5fb6844e76687bb47f7b7e549307c95305fdae
-
SHA256
619d55dafa6cfdc23580e3a1e8a57ef3a246a0163385f4a61a591ac0517d85f6
-
SHA512
2e0c010d934131d0641f89c9ebeb7a295f519e09578bda477f58b88b4e8c0d7658adc3c07f8a94e455b4b4c46fcd56e32c27f5afb4b4ededccb668fdd572042c
Score
10/10
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2608-133-0x0000000000BA0000-0x0000000000C48000-memory.dmp family_masslogger behavioral2/memory/2608-134-0x0000000000BA0000-0x0000000000C48000-memory.dmp family_masslogger -
Drops startup file 1 IoCs
Processes:
notepad.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wewewew.vbs notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
wewewewe.exedescription pid process target process PID 2224 set thread context of 2608 2224 wewewewe.exe wewewewe.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
wewewewe.exepowershell.exepid process 2224 wewewewe.exe 2224 wewewewe.exe 4280 powershell.exe 4280 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
wewewewe.exepid process 2224 wewewewe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 4280 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
wewewewe.exewewewewe.execmd.exedescription pid process target process PID 2224 wrote to memory of 2432 2224 wewewewe.exe notepad.exe PID 2224 wrote to memory of 2432 2224 wewewewe.exe notepad.exe PID 2224 wrote to memory of 2432 2224 wewewewe.exe notepad.exe PID 2224 wrote to memory of 2432 2224 wewewewe.exe notepad.exe PID 2224 wrote to memory of 2432 2224 wewewewe.exe notepad.exe PID 2224 wrote to memory of 2608 2224 wewewewe.exe wewewewe.exe PID 2224 wrote to memory of 2608 2224 wewewewe.exe wewewewe.exe PID 2224 wrote to memory of 2608 2224 wewewewe.exe wewewewe.exe PID 2608 wrote to memory of 4368 2608 wewewewe.exe cmd.exe PID 2608 wrote to memory of 4368 2608 wewewewe.exe cmd.exe PID 2608 wrote to memory of 4368 2608 wewewewe.exe cmd.exe PID 4368 wrote to memory of 4280 4368 cmd.exe powershell.exe PID 4368 wrote to memory of 4280 4368 cmd.exe powershell.exe PID 4368 wrote to memory of 4280 4368 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\wewewewe.exe"C:\Users\Admin\AppData\Local\Temp\wewewewe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Drops startup file
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\wewewewe.exe"C:\Users\Admin\AppData\Local\Temp\wewewewe.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\wewewewe.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\wewewewe.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280