Analysis
-
max time kernel
128s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:53
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry List Details.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Inquiry List Details.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
Inquiry List Details.exe
-
Size
868KB
-
MD5
18441e9c6156df94b21556dab4ef4701
-
SHA1
25b9a51950b21e8d86b56770a9d23225b1a5e40e
-
SHA256
fb248d3c4b08dd0bef37e565fbe078a57f13b5214b8cafeccf42bdd50767678d
-
SHA512
3719e583e8703f950fa9dc0c62badc4781aa6b5f2c585b1817cfe7f6cba39ba9f89b7f3571350aad60fe50c24b9f9c37ab1e5672aaf9b0ebe1361fac4ce833c4
Score
10/10
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5108-135-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Inquiry List Details.exedescription pid process target process PID 4984 set thread context of 5108 4984 Inquiry List Details.exe Inquiry List Details.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
Inquiry List Details.exeInquiry List Details.exepowershell.exepid process 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 4984 Inquiry List Details.exe 5108 Inquiry List Details.exe 5108 Inquiry List Details.exe 1788 powershell.exe 1788 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Inquiry List Details.exeInquiry List Details.exepowershell.exedescription pid process Token: SeDebugPrivilege 4984 Inquiry List Details.exe Token: SeDebugPrivilege 5108 Inquiry List Details.exe Token: SeDebugPrivilege 1788 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Inquiry List Details.exeInquiry List Details.execmd.exedescription pid process target process PID 4984 wrote to memory of 5108 4984 Inquiry List Details.exe Inquiry List Details.exe PID 4984 wrote to memory of 5108 4984 Inquiry List Details.exe Inquiry List Details.exe PID 4984 wrote to memory of 5108 4984 Inquiry List Details.exe Inquiry List Details.exe PID 4984 wrote to memory of 5108 4984 Inquiry List Details.exe Inquiry List Details.exe PID 4984 wrote to memory of 5108 4984 Inquiry List Details.exe Inquiry List Details.exe PID 4984 wrote to memory of 5108 4984 Inquiry List Details.exe Inquiry List Details.exe PID 4984 wrote to memory of 5108 4984 Inquiry List Details.exe Inquiry List Details.exe PID 4984 wrote to memory of 5108 4984 Inquiry List Details.exe Inquiry List Details.exe PID 5108 wrote to memory of 1960 5108 Inquiry List Details.exe cmd.exe PID 5108 wrote to memory of 1960 5108 Inquiry List Details.exe cmd.exe PID 5108 wrote to memory of 1960 5108 Inquiry List Details.exe cmd.exe PID 1960 wrote to memory of 1788 1960 cmd.exe powershell.exe PID 1960 wrote to memory of 1788 1960 cmd.exe powershell.exe PID 1960 wrote to memory of 1788 1960 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Inquiry List Details.exe"C:\Users\Admin\AppData\Local\Temp\Inquiry List Details.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\Inquiry List Details.exe"C:\Users\Admin\AppData\Local\Temp\Inquiry List Details.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Inquiry List Details.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Inquiry List Details.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
-