Analysis
-
max time kernel
79s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 11:40
Static task
static1
Behavioral task
behavioral1
Sample
HALKBANK.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
HALKBANK.exe
Resource
win10v2004-20220414-en
General
-
Target
HALKBANK.exe
-
Size
2.6MB
-
MD5
0dc79297559b6ff6a2db2870c4de1313
-
SHA1
ed43611311d5a94ce56a5fff8e45a8ac437fbf12
-
SHA256
16fcaf343d6c5ec3c546339a522c47b7e44f0684ff50a7acf49d8439e2956a93
-
SHA512
c3afb996357edb3c6d006476768a3354d629eb29ff345d64098369cad19753a50a7eefe28fc53e8f4841cc7a006b2fa43cb906a65852cab91525c2be1a161a1b
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1708-54-0x00000000008B0000-0x0000000000B56000-memory.dmp family_masslogger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe family_masslogger \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe family_masslogger \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe family_masslogger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe family_masslogger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe family_masslogger behavioral1/memory/1724-102-0x0000000001100000-0x00000000013A6000-memory.dmp family_masslogger -
Executes dropped EXE 3 IoCs
Processes:
RegAsm.exefirefoxx.exefirefoxx.exepid process 2044 RegAsm.exe 1724 firefoxx.exe 1696 firefoxx.exe -
Loads dropped DLL 4 IoCs
Processes:
HALKBANK.exeRegAsm.exepid process 1708 HALKBANK.exe 2044 RegAsm.exe 2044 RegAsm.exe 1708 HALKBANK.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefoxx = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\firefoxx.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
HALKBANK.exedescription pid process target process PID 1708 set thread context of 2044 1708 HALKBANK.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
HALKBANK.exeRegAsm.exefirefoxx.exefirefoxx.exepid process 1708 HALKBANK.exe 1708 HALKBANK.exe 1708 HALKBANK.exe 2044 RegAsm.exe 1708 HALKBANK.exe 2044 RegAsm.exe 1724 firefoxx.exe 1696 firefoxx.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
HALKBANK.exeRegAsm.exefirefoxx.exefirefoxx.exedescription pid process Token: SeDebugPrivilege 1708 HALKBANK.exe Token: SeDebugPrivilege 2044 RegAsm.exe Token: SeDebugPrivilege 1724 firefoxx.exe Token: SeDebugPrivilege 1696 firefoxx.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
HALKBANK.execmd.exeRegAsm.exedescription pid process target process PID 1708 wrote to memory of 2044 1708 HALKBANK.exe RegAsm.exe PID 1708 wrote to memory of 2044 1708 HALKBANK.exe RegAsm.exe PID 1708 wrote to memory of 2044 1708 HALKBANK.exe RegAsm.exe PID 1708 wrote to memory of 2044 1708 HALKBANK.exe RegAsm.exe PID 1708 wrote to memory of 2044 1708 HALKBANK.exe RegAsm.exe PID 1708 wrote to memory of 2044 1708 HALKBANK.exe RegAsm.exe PID 1708 wrote to memory of 2044 1708 HALKBANK.exe RegAsm.exe PID 1708 wrote to memory of 2044 1708 HALKBANK.exe RegAsm.exe PID 1708 wrote to memory of 2044 1708 HALKBANK.exe RegAsm.exe PID 1708 wrote to memory of 2044 1708 HALKBANK.exe RegAsm.exe PID 1708 wrote to memory of 2044 1708 HALKBANK.exe RegAsm.exe PID 1708 wrote to memory of 2044 1708 HALKBANK.exe RegAsm.exe PID 1708 wrote to memory of 1632 1708 HALKBANK.exe cmd.exe PID 1708 wrote to memory of 1632 1708 HALKBANK.exe cmd.exe PID 1708 wrote to memory of 1632 1708 HALKBANK.exe cmd.exe PID 1708 wrote to memory of 1632 1708 HALKBANK.exe cmd.exe PID 1632 wrote to memory of 520 1632 cmd.exe reg.exe PID 1632 wrote to memory of 520 1632 cmd.exe reg.exe PID 1632 wrote to memory of 520 1632 cmd.exe reg.exe PID 1632 wrote to memory of 520 1632 cmd.exe reg.exe PID 2044 wrote to memory of 1724 2044 RegAsm.exe firefoxx.exe PID 2044 wrote to memory of 1724 2044 RegAsm.exe firefoxx.exe PID 2044 wrote to memory of 1724 2044 RegAsm.exe firefoxx.exe PID 2044 wrote to memory of 1724 2044 RegAsm.exe firefoxx.exe PID 1708 wrote to memory of 1696 1708 HALKBANK.exe firefoxx.exe PID 1708 wrote to memory of 1696 1708 HALKBANK.exe firefoxx.exe PID 1708 wrote to memory of 1696 1708 HALKBANK.exe firefoxx.exe PID 1708 wrote to memory of 1696 1708 HALKBANK.exe firefoxx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HALKBANK.exe"C:\Users\Admin\AppData\Local\Temp\HALKBANK.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v firefoxx /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v firefoxx /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"3⤵
- Adds Run key to start application
PID:520
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\firefoxx.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
Filesize
2.6MB
MD50dc79297559b6ff6a2db2870c4de1313
SHA1ed43611311d5a94ce56a5fff8e45a8ac437fbf12
SHA25616fcaf343d6c5ec3c546339a522c47b7e44f0684ff50a7acf49d8439e2956a93
SHA512c3afb996357edb3c6d006476768a3354d629eb29ff345d64098369cad19753a50a7eefe28fc53e8f4841cc7a006b2fa43cb906a65852cab91525c2be1a161a1b
-
Filesize
2.6MB
MD50dc79297559b6ff6a2db2870c4de1313
SHA1ed43611311d5a94ce56a5fff8e45a8ac437fbf12
SHA25616fcaf343d6c5ec3c546339a522c47b7e44f0684ff50a7acf49d8439e2956a93
SHA512c3afb996357edb3c6d006476768a3354d629eb29ff345d64098369cad19753a50a7eefe28fc53e8f4841cc7a006b2fa43cb906a65852cab91525c2be1a161a1b
-
Filesize
2.6MB
MD50dc79297559b6ff6a2db2870c4de1313
SHA1ed43611311d5a94ce56a5fff8e45a8ac437fbf12
SHA25616fcaf343d6c5ec3c546339a522c47b7e44f0684ff50a7acf49d8439e2956a93
SHA512c3afb996357edb3c6d006476768a3354d629eb29ff345d64098369cad19753a50a7eefe28fc53e8f4841cc7a006b2fa43cb906a65852cab91525c2be1a161a1b
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
Filesize
2.6MB
MD50dc79297559b6ff6a2db2870c4de1313
SHA1ed43611311d5a94ce56a5fff8e45a8ac437fbf12
SHA25616fcaf343d6c5ec3c546339a522c47b7e44f0684ff50a7acf49d8439e2956a93
SHA512c3afb996357edb3c6d006476768a3354d629eb29ff345d64098369cad19753a50a7eefe28fc53e8f4841cc7a006b2fa43cb906a65852cab91525c2be1a161a1b
-
Filesize
2.6MB
MD50dc79297559b6ff6a2db2870c4de1313
SHA1ed43611311d5a94ce56a5fff8e45a8ac437fbf12
SHA25616fcaf343d6c5ec3c546339a522c47b7e44f0684ff50a7acf49d8439e2956a93
SHA512c3afb996357edb3c6d006476768a3354d629eb29ff345d64098369cad19753a50a7eefe28fc53e8f4841cc7a006b2fa43cb906a65852cab91525c2be1a161a1b