Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-06-2022 19:11
Static task
static1
Behavioral task
behavioral1
Sample
0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe
Resource
win10v2004-20220414-en
General
-
Target
0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe
-
Size
1.5MB
-
MD5
4268a67c503b51b1405af8e986a96b87
-
SHA1
651b495b929ee0eb7d232fa8b8938e9154575140
-
SHA256
0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2
-
SHA512
40a4dbd99bbbe4b98d97ea021e63c39eb0132818a495ed3af0d9f825358fee951b16f3d229432492041188eeb265f6a7fd67a3b42fce0c8096004abb32737c57
Malware Config
Signatures
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
Processes:
resource yara_rule behavioral1/memory/908-63-0x0000000005240000-0x00000000052D0000-memory.dmp m00nd3v_logger -
Drops startup file 1 IoCs
Processes:
cscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win32.Lnk cscript.exe -
Loads dropped DLL 1 IoCs
Processes:
cscript.exepid process 1692 cscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exepid process 908 0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe 908 0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe 908 0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exedescription pid process Token: SeDebugPrivilege 908 0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exedescription pid process target process PID 908 wrote to memory of 1692 908 0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe cscript.exe PID 908 wrote to memory of 1692 908 0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe cscript.exe PID 908 wrote to memory of 1692 908 0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe cscript.exe PID 908 wrote to memory of 1692 908 0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe cscript.exe PID 908 wrote to memory of 1616 908 0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe RegAsm.exe PID 908 wrote to memory of 1616 908 0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe RegAsm.exe PID 908 wrote to memory of 1616 908 0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe RegAsm.exe PID 908 wrote to memory of 1616 908 0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe RegAsm.exe PID 908 wrote to memory of 1616 908 0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe RegAsm.exe PID 908 wrote to memory of 1616 908 0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe RegAsm.exe PID 908 wrote to memory of 1616 908 0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe"C:\Users\Admin\AppData\Local\Temp\0e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\System32\cscript.exe" //B //Nologo C:\Users\Admin\win32.vbs2⤵
- Drops startup file
- Loads dropped DLL
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\win32.exeFilesize
1.5MB
MD54268a67c503b51b1405af8e986a96b87
SHA1651b495b929ee0eb7d232fa8b8938e9154575140
SHA2560e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2
SHA51240a4dbd99bbbe4b98d97ea021e63c39eb0132818a495ed3af0d9f825358fee951b16f3d229432492041188eeb265f6a7fd67a3b42fce0c8096004abb32737c57
-
C:\Users\Admin\win32.vbsFilesize
301B
MD5bb19a425fe7febb5170c4c857ca7cdf7
SHA11cff91a568bd3945144bd58abeb5bb42ba6f58b4
SHA256710e665eb73240b8907ea09851e369e6343f95f51d57b6d522f714ed6d052f50
SHA5127e904897e9ac0257cb30cc6f1593bf61560e59501395a180ba6ca23f233f9d580d294dd55ab1cddfa477da5e8b1fa174f0f47e6a5dd28ef2b00dd67461f08abf
-
\Users\Admin\AppData\Roaming\win32.exeFilesize
1.5MB
MD54268a67c503b51b1405af8e986a96b87
SHA1651b495b929ee0eb7d232fa8b8938e9154575140
SHA2560e5d0fddd0a16d73df5ae711b7cdc4404471286ed7f12c049c3763c5426a3fb2
SHA51240a4dbd99bbbe4b98d97ea021e63c39eb0132818a495ed3af0d9f825358fee951b16f3d229432492041188eeb265f6a7fd67a3b42fce0c8096004abb32737c57
-
memory/908-67-0x0000000071E30000-0x0000000072840000-memory.dmpFilesize
10.1MB
-
memory/908-65-0x0000000072840000-0x0000000073BCF000-memory.dmpFilesize
19.6MB
-
memory/908-57-0x0000000000650000-0x0000000000678000-memory.dmpFilesize
160KB
-
memory/908-56-0x0000000004B70000-0x0000000004C32000-memory.dmpFilesize
776KB
-
memory/908-55-0x0000000075CD1000-0x0000000075CD3000-memory.dmpFilesize
8KB
-
memory/908-63-0x0000000005240000-0x00000000052D0000-memory.dmpFilesize
576KB
-
memory/908-64-0x00000000702F0000-0x00000000704C1000-memory.dmpFilesize
1.8MB
-
memory/908-70-0x0000000070890000-0x0000000070FCE000-memory.dmpFilesize
7.2MB
-
memory/908-66-0x0000000073EE0000-0x00000000746C0000-memory.dmpFilesize
7.9MB
-
memory/908-54-0x0000000000D50000-0x0000000000ED0000-memory.dmpFilesize
1.5MB
-
memory/908-68-0x0000000072840000-0x0000000073BCF000-memory.dmpFilesize
19.6MB
-
memory/908-69-0x0000000070FD0000-0x00000000710CC000-memory.dmpFilesize
1008KB
-
memory/908-71-0x00000000710D0000-0x0000000071E26000-memory.dmpFilesize
13.3MB
-
memory/1692-58-0x0000000000000000-mapping.dmp