Analysis
-
max time kernel
30s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 23:30
Static task
static1
Behavioral task
behavioral1
Sample
a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe
Resource
win10v2004-20220414-en
General
-
Target
a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe
-
Size
1.3MB
-
MD5
9a4bb2ca5dccc84a90fc2fd2276023fa
-
SHA1
c541e7269e3b125bf947ab9b5069f3929b7baa92
-
SHA256
a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd
-
SHA512
a7d16010fc5c56fd296c5832410ff459f4f0353e290f4238d413e9a40f064469d17c2253a1c59b2b1622b4e93884f87d136293f3ef5dc4c7666396820dcabd83
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 33 IoCs
resource yara_rule behavioral2/memory/2992-132-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-131-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-139-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-141-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-143-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-147-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-155-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-161-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-165-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-163-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-159-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-157-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-153-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-169-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-179-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-189-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-191-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-195-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-193-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-187-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-185-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-183-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-181-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-177-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-175-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-173-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-171-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-167-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-151-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-149-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-145-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-137-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger behavioral2/memory/2992-135-0x0000000000C50000-0x0000000000D02000-memory.dmp family_masslogger -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2704 set thread context of 2992 2704 a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe 72 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2704 a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe 2704 a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe 3960 powershell.exe 3960 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2704 a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2992 a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe Token: SeDebugPrivilege 3960 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2992 2704 a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe 72 PID 2704 wrote to memory of 2992 2704 a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe 72 PID 2704 wrote to memory of 2992 2704 a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe 72 PID 2992 wrote to memory of 3056 2992 a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe 81 PID 2992 wrote to memory of 3056 2992 a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe 81 PID 2992 wrote to memory of 3056 2992 a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe 81 PID 3056 wrote to memory of 3960 3056 cmd.exe 80 PID 3056 wrote to memory of 3960 3056 cmd.exe 80 PID 3056 wrote to memory of 3960 3056 cmd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe"C:\Users\Admin\AppData\Local\Temp\a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe"C:\Users\Admin\AppData\Local\Temp\a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:3056
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\a556b45b3d2247dc814a2100a0827b1d68d87ec670a1e6791f6e67926cdad4bd.exe'1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3960