Analysis
-
max time kernel
55s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 12:25
Static task
static1
Behavioral task
behavioral1
Sample
IMG_6110.scr
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
IMG_6110.scr
Resource
win10v2004-20220414-en
General
-
Target
IMG_6110.scr
-
Size
920KB
-
MD5
a7f29df168c669851c1979dbc41c95b2
-
SHA1
46d9da6397c063544cdd8dc9b9f8a65142aefa40
-
SHA256
bc6a63b07a18d95278dee0e0d77c1e91d4a80bfca9732f030ce069894f610b14
-
SHA512
79c92ba1352bff8f8f705b325a91196c867d45939ecf2bafac386c192637990d8a212d52b31bfb249794c28c1d1bee0c663ba827983b2fbb803271ca3446d0c6
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\79FE0CC911\Log.txt
masslogger
Signatures
-
CoreEntity .NET Packer 1 IoCs
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
Processes:
resource yara_rule behavioral1/memory/1972-56-0x0000000000610000-0x0000000000618000-memory.dmp coreentity -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/1972-57-0x00000000080C0000-0x0000000008170000-memory.dmp rezer0 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
IMG_6110.scrdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\International\Geo\Nation IMG_6110.scr -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
IMG_6110.scrdescription pid process target process PID 1972 set thread context of 1720 1972 IMG_6110.scr IMG_6110.scr -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
IMG_6110.scrpid process 1720 IMG_6110.scr -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
IMG_6110.scrdescription pid process Token: SeDebugPrivilege 1720 IMG_6110.scr -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
IMG_6110.scrdescription pid process target process PID 1972 wrote to memory of 1720 1972 IMG_6110.scr IMG_6110.scr PID 1972 wrote to memory of 1720 1972 IMG_6110.scr IMG_6110.scr PID 1972 wrote to memory of 1720 1972 IMG_6110.scr IMG_6110.scr PID 1972 wrote to memory of 1720 1972 IMG_6110.scr IMG_6110.scr PID 1972 wrote to memory of 1720 1972 IMG_6110.scr IMG_6110.scr PID 1972 wrote to memory of 1720 1972 IMG_6110.scr IMG_6110.scr PID 1972 wrote to memory of 1720 1972 IMG_6110.scr IMG_6110.scr PID 1972 wrote to memory of 1720 1972 IMG_6110.scr IMG_6110.scr PID 1972 wrote to memory of 1720 1972 IMG_6110.scr IMG_6110.scr
Processes
-
C:\Users\Admin\AppData\Local\Temp\IMG_6110.scr"C:\Users\Admin\AppData\Local\Temp\IMG_6110.scr" /S1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\IMG_6110.scr"{path}"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-