Analysis
-
max time kernel
192s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 01:32
Static task
static1
Behavioral task
behavioral1
Sample
scan00001543.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
scan00001543.exe
Resource
win10v2004-20220414-en
General
-
Target
scan00001543.exe
-
Size
398KB
-
MD5
5678efb48a28b255830a91e260c2504e
-
SHA1
e030714e67ddeff23860be582553807d15c7f1e2
-
SHA256
717cc1c1cd1788a45027d549ae018a57f72e8f5f7586be633055c2400440b489
-
SHA512
c6146c170b937a7daa9e6be50f7df9eb552216222d474965a41730d4ddfbeaa00466bea48318951b1e5c33d6a79b9791d788ab4e4dc8fac51cea32d35cc54477
Malware Config
Signatures
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
Processes:
resource yara_rule behavioral2/memory/4856-138-0x0000000000400000-0x0000000000444000-memory.dmp m00nd3v_logger -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/4856-138-0x0000000000400000-0x0000000000444000-memory.dmp MailPassView -
Nirsoft 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4856-138-0x0000000000400000-0x0000000000444000-memory.dmp Nirsoft -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
scan00001543.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation scan00001543.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
scan00001543.exedescription pid process target process PID 2576 set thread context of 4856 2576 scan00001543.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
scan00001543.exedescription pid process target process PID 2576 wrote to memory of 4204 2576 scan00001543.exe schtasks.exe PID 2576 wrote to memory of 4204 2576 scan00001543.exe schtasks.exe PID 2576 wrote to memory of 4204 2576 scan00001543.exe schtasks.exe PID 2576 wrote to memory of 4856 2576 scan00001543.exe MSBuild.exe PID 2576 wrote to memory of 4856 2576 scan00001543.exe MSBuild.exe PID 2576 wrote to memory of 4856 2576 scan00001543.exe MSBuild.exe PID 2576 wrote to memory of 4856 2576 scan00001543.exe MSBuild.exe PID 2576 wrote to memory of 4856 2576 scan00001543.exe MSBuild.exe PID 2576 wrote to memory of 4856 2576 scan00001543.exe MSBuild.exe PID 2576 wrote to memory of 4856 2576 scan00001543.exe MSBuild.exe PID 2576 wrote to memory of 4856 2576 scan00001543.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\scan00001543.exe"C:\Users\Admin\AppData\Local\Temp\scan00001543.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zICDBE" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDA14.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpDA14.tmpFilesize
1KB
MD5ebe8b76dd79c203fc0b936ecee2091aa
SHA15b4fb6ae3b9daab643e9b07217145c25511ae792
SHA25689371a82241115447c33424b1a13146177181d4a9ad78c2652ca6d13ba7261ca
SHA5129e7b41eae03e54b8fd5d45f4bf5e872f6841763b6862eb46cff59a42b827c67c922dba71fd9a17854f8d0e6d14a8a44a35b20ee7b798e98fbc4a27e97e350403
-
memory/2576-130-0x0000000000030000-0x000000000009A000-memory.dmpFilesize
424KB
-
memory/2576-131-0x0000000007450000-0x00000000079F4000-memory.dmpFilesize
5.6MB
-
memory/2576-132-0x0000000006F40000-0x0000000006FD2000-memory.dmpFilesize
584KB
-
memory/2576-133-0x0000000006F10000-0x0000000006F1A000-memory.dmpFilesize
40KB
-
memory/2576-134-0x000000000A9B0000-0x000000000AA4C000-memory.dmpFilesize
624KB
-
memory/4204-135-0x0000000000000000-mapping.dmp
-
memory/4856-137-0x0000000000000000-mapping.dmp
-
memory/4856-138-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/4856-139-0x0000000005610000-0x0000000005676000-memory.dmpFilesize
408KB