Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 01:24
Static task
static1
Behavioral task
behavioral1
Sample
logo.png
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
logo.png
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
requirements and delivery order.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
requirements and delivery order.exe
Resource
win10v2004-20220414-en
General
-
Target
requirements and delivery order.exe
-
Size
970KB
-
MD5
6085ac87589c9ac7ce7fece0a743d4d3
-
SHA1
d493ca5f57b3a9f8893a287c3ee64e387e30b1fa
-
SHA256
f959039896cdd9c4add867b06af7d100629377c66ef7fb0fd4aeba48f9a9593e
-
SHA512
09ecb1d0b7a70b0b9604f59bdc6ee9ca83560b7e0a815369992c80023a43bbd1ebe7aa199648744290121b042c22c90b3a4cd83da5682eccef48b5a390008546
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 1 IoCs
Processes:
resource yara_rule behavioral4/memory/2332-136-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger -
Suspicious use of SetThreadContext 1 IoCs
Processes:
requirements and delivery order.exedescription pid process target process PID 3804 set thread context of 2332 3804 requirements and delivery order.exe requirements and delivery order.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
requirements and delivery order.exerequirements and delivery order.exepowershell.exepid process 3804 requirements and delivery order.exe 3804 requirements and delivery order.exe 3804 requirements and delivery order.exe 2332 requirements and delivery order.exe 2332 requirements and delivery order.exe 3660 powershell.exe 3660 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
requirements and delivery order.exerequirements and delivery order.exepowershell.exedescription pid process Token: SeDebugPrivilege 3804 requirements and delivery order.exe Token: SeDebugPrivilege 2332 requirements and delivery order.exe Token: SeDebugPrivilege 3660 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
requirements and delivery order.exerequirements and delivery order.execmd.exedescription pid process target process PID 3804 wrote to memory of 2332 3804 requirements and delivery order.exe requirements and delivery order.exe PID 3804 wrote to memory of 2332 3804 requirements and delivery order.exe requirements and delivery order.exe PID 3804 wrote to memory of 2332 3804 requirements and delivery order.exe requirements and delivery order.exe PID 3804 wrote to memory of 2332 3804 requirements and delivery order.exe requirements and delivery order.exe PID 3804 wrote to memory of 2332 3804 requirements and delivery order.exe requirements and delivery order.exe PID 3804 wrote to memory of 2332 3804 requirements and delivery order.exe requirements and delivery order.exe PID 3804 wrote to memory of 2332 3804 requirements and delivery order.exe requirements and delivery order.exe PID 3804 wrote to memory of 2332 3804 requirements and delivery order.exe requirements and delivery order.exe PID 2332 wrote to memory of 3108 2332 requirements and delivery order.exe cmd.exe PID 2332 wrote to memory of 3108 2332 requirements and delivery order.exe cmd.exe PID 2332 wrote to memory of 3108 2332 requirements and delivery order.exe cmd.exe PID 3108 wrote to memory of 3660 3108 cmd.exe powershell.exe PID 3108 wrote to memory of 3660 3108 cmd.exe powershell.exe PID 3108 wrote to memory of 3660 3108 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\requirements and delivery order.exe"C:\Users\Admin\AppData\Local\Temp\requirements and delivery order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\requirements and delivery order.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\requirements and delivery order.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\requirements and delivery order.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\requirements and delivery order.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3