Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 02:37
Static task
static1
Behavioral task
behavioral1
Sample
097663899 NEW ORDER.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
097663899 NEW ORDER.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
097663899 NEW ORDER.exe
-
Size
806KB
-
MD5
7fa6a760ba0703205ba51d9bd39d67b3
-
SHA1
965538e4662b0b2d628c1f3f72f2ec0b570d2424
-
SHA256
c744751ad79f737ac78fe9c69afac4c7b8940951b2fe67d20175d27e77721371
-
SHA512
3d906e71f364e4ebd915634094a49ea4223c27bfb76529be9d49b65044610305022492d6e235952cb480f6a3da0477a98c71a450e8a8511803cc4efdc652c00e
Score
10/10
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1484-59-0x0000000000400000-0x000000000048E000-memory.dmp family_masslogger behavioral1/memory/1484-60-0x0000000000400000-0x000000000048E000-memory.dmp family_masslogger behavioral1/memory/1484-62-0x000000000048997E-mapping.dmp family_masslogger behavioral1/memory/1484-61-0x0000000000400000-0x000000000048E000-memory.dmp family_masslogger behavioral1/memory/1484-64-0x0000000000400000-0x000000000048E000-memory.dmp family_masslogger behavioral1/memory/1484-66-0x0000000000400000-0x000000000048E000-memory.dmp family_masslogger -
Suspicious use of SetThreadContext 1 IoCs
Processes:
097663899 NEW ORDER.exedescription pid process target process PID 784 set thread context of 1484 784 097663899 NEW ORDER.exe RegSvcs.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
097663899 NEW ORDER.exeRegSvcs.exedescription pid process target process PID 784 wrote to memory of 1484 784 097663899 NEW ORDER.exe RegSvcs.exe PID 784 wrote to memory of 1484 784 097663899 NEW ORDER.exe RegSvcs.exe PID 784 wrote to memory of 1484 784 097663899 NEW ORDER.exe RegSvcs.exe PID 784 wrote to memory of 1484 784 097663899 NEW ORDER.exe RegSvcs.exe PID 784 wrote to memory of 1484 784 097663899 NEW ORDER.exe RegSvcs.exe PID 784 wrote to memory of 1484 784 097663899 NEW ORDER.exe RegSvcs.exe PID 784 wrote to memory of 1484 784 097663899 NEW ORDER.exe RegSvcs.exe PID 784 wrote to memory of 1484 784 097663899 NEW ORDER.exe RegSvcs.exe PID 784 wrote to memory of 1484 784 097663899 NEW ORDER.exe RegSvcs.exe PID 784 wrote to memory of 1484 784 097663899 NEW ORDER.exe RegSvcs.exe PID 784 wrote to memory of 1484 784 097663899 NEW ORDER.exe RegSvcs.exe PID 784 wrote to memory of 1484 784 097663899 NEW ORDER.exe RegSvcs.exe PID 1484 wrote to memory of 2044 1484 RegSvcs.exe dw20.exe PID 1484 wrote to memory of 2044 1484 RegSvcs.exe dw20.exe PID 1484 wrote to memory of 2044 1484 RegSvcs.exe dw20.exe PID 1484 wrote to memory of 2044 1484 RegSvcs.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\097663899 NEW ORDER.exe"C:\Users\Admin\AppData\Local\Temp\097663899 NEW ORDER.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 3723⤵PID:2044
-
-