Analysis
-
max time kernel
188s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:53
Static task
static1
Behavioral task
behavioral1
Sample
Order List.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Order List.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
Order List.exe
-
Size
889KB
-
MD5
523d2c641aa2e75c31bcafe232fcfb80
-
SHA1
b6b100e6985fccd85afd8a4864b39d9e5b61803b
-
SHA256
d6669aaf12fcea6f6a3283e6ba6ce484574f309fbd1f80c7a3ee13ba1746a3d1
-
SHA512
d8664fdd1de94906d346f023ff8fd4dd6089db9aede78abd35b52f50bdeb9b8de89c8b10ab660e9611e6826c0a6a9134d60fc8062acb9ea4c8b60d3af2f4b8a5
Score
10/10
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4620-135-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Order List.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\chrome = "\"C:\\Users\\Admin\\AppData\\Roaming\\chrome.exe\"" Order List.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Order List.exedescription pid process target process PID 1696 set thread context of 4620 1696 Order List.exe Order List.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
Order List.exeOrder List.exepowershell.exepid process 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 1696 Order List.exe 4620 Order List.exe 4620 Order List.exe 4700 powershell.exe 4700 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Order List.exeOrder List.exepowershell.exedescription pid process Token: SeDebugPrivilege 1696 Order List.exe Token: SeDebugPrivilege 4620 Order List.exe Token: SeDebugPrivilege 4700 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Order List.exeOrder List.execmd.exedescription pid process target process PID 1696 wrote to memory of 4620 1696 Order List.exe Order List.exe PID 1696 wrote to memory of 4620 1696 Order List.exe Order List.exe PID 1696 wrote to memory of 4620 1696 Order List.exe Order List.exe PID 1696 wrote to memory of 4620 1696 Order List.exe Order List.exe PID 1696 wrote to memory of 4620 1696 Order List.exe Order List.exe PID 1696 wrote to memory of 4620 1696 Order List.exe Order List.exe PID 1696 wrote to memory of 4620 1696 Order List.exe Order List.exe PID 1696 wrote to memory of 4620 1696 Order List.exe Order List.exe PID 4620 wrote to memory of 3280 4620 Order List.exe cmd.exe PID 4620 wrote to memory of 3280 4620 Order List.exe cmd.exe PID 4620 wrote to memory of 3280 4620 Order List.exe cmd.exe PID 3280 wrote to memory of 4700 3280 cmd.exe powershell.exe PID 3280 wrote to memory of 4700 3280 cmd.exe powershell.exe PID 3280 wrote to memory of 4700 3280 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order List.exe"C:\Users\Admin\AppData\Local\Temp\Order List.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\Order List.exe"C:\Users\Admin\AppData\Local\Temp\Order List.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Order List.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Order List.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4700