Analysis
-
max time kernel
111s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-05-2022 01:07
Static task
static1
Behavioral task
behavioral1
Sample
kesh.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
kesh.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
kesh.exe
-
Size
1.3MB
-
MD5
aff458f89b918aca8c12c638ce8fece2
-
SHA1
24bddc3fee66de67a6db095ed22033af895e7b41
-
SHA256
3ce259abdca64cabc5ac51d1810ccff6a02fed247f4e65884d4fa4d23f18e086
-
SHA512
ae8c5e8afcfad1359566dee132b24dca1f8e40d3eadac9302075bb326b10ee7e1de25de3f37957dd7c665b2eb3687afd824b35003918b68e4c83fda7d69ada17
Score
10/10
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 33 IoCs
Processes:
resource yara_rule behavioral2/memory/2896-134-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-133-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-136-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-138-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-140-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-142-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-144-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-152-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-156-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-164-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-168-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-172-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-180-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-184-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-192-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-194-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-196-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-190-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-188-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-186-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-182-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-178-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-176-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-174-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-170-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-166-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-162-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-160-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-158-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-154-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-150-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-148-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger behavioral2/memory/2896-146-0x0000000000C40000-0x0000000000CF2000-memory.dmp family_masslogger -
Drops startup file 1 IoCs
Processes:
notepad.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ksh.vbs notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
kesh.exedescription pid process target process PID 1336 set thread context of 2896 1336 kesh.exe kesh.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
kesh.exepowershell.exepid process 1336 kesh.exe 1336 kesh.exe 1136 powershell.exe 1136 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
kesh.exepid process 1336 kesh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
kesh.exepowershell.exedescription pid process Token: SeDebugPrivilege 2896 kesh.exe Token: SeDebugPrivilege 1136 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
kesh.exekesh.execmd.exedescription pid process target process PID 1336 wrote to memory of 3124 1336 kesh.exe notepad.exe PID 1336 wrote to memory of 3124 1336 kesh.exe notepad.exe PID 1336 wrote to memory of 3124 1336 kesh.exe notepad.exe PID 1336 wrote to memory of 3124 1336 kesh.exe notepad.exe PID 1336 wrote to memory of 3124 1336 kesh.exe notepad.exe PID 1336 wrote to memory of 2896 1336 kesh.exe kesh.exe PID 1336 wrote to memory of 2896 1336 kesh.exe kesh.exe PID 1336 wrote to memory of 2896 1336 kesh.exe kesh.exe PID 2896 wrote to memory of 4552 2896 kesh.exe cmd.exe PID 2896 wrote to memory of 4552 2896 kesh.exe cmd.exe PID 2896 wrote to memory of 4552 2896 kesh.exe cmd.exe PID 4552 wrote to memory of 1136 4552 cmd.exe powershell.exe PID 4552 wrote to memory of 1136 4552 cmd.exe powershell.exe PID 4552 wrote to memory of 1136 4552 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\kesh.exe"C:\Users\Admin\AppData\Local\Temp\kesh.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Drops startup file
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\kesh.exe"C:\Users\Admin\AppData\Local\Temp\kesh.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\kesh.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\kesh.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1136