Analysis
-
max time kernel
36s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11-06-2022 19:14
Static task
static1
Behavioral task
behavioral1
Sample
256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe
Resource
win10v2004-20220414-en
General
-
Target
256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe
-
Size
788KB
-
MD5
eec2f17ba084b62fe9a20c9898838db7
-
SHA1
0ae77e1421e7ae5fff9b6a771162b0114b674a7b
-
SHA256
256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45
-
SHA512
90893d074ea672a3dbe40c29ea2b25984df4cfe134ee4248109cf91377859639fee1b5a3887dd1b9f046409c949f21e745e456f3825c24862e7320090e86bde9
Malware Config
Signatures
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
Processes:
resource yara_rule behavioral1/memory/916-62-0x00000000006E0000-0x000000000077C000-memory.dmp m00nd3v_logger -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/916-62-0x00000000006E0000-0x000000000077C000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/memory/916-62-0x00000000006E0000-0x000000000077C000-memory.dmp WebBrowserPassView -
Nirsoft 1 IoCs
Processes:
resource yara_rule behavioral1/memory/916-62-0x00000000006E0000-0x000000000077C000-memory.dmp Nirsoft -
Suspicious use of SetThreadContext 1 IoCs
Processes:
256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exedescription pid process target process PID 548 set thread context of 916 548 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exepid process 548 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exedescription pid process target process PID 548 wrote to memory of 916 548 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe PID 548 wrote to memory of 916 548 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe PID 548 wrote to memory of 916 548 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe PID 548 wrote to memory of 916 548 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe PID 548 wrote to memory of 916 548 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe PID 548 wrote to memory of 916 548 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe PID 548 wrote to memory of 916 548 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe PID 548 wrote to memory of 916 548 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe PID 548 wrote to memory of 916 548 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe PID 548 wrote to memory of 916 548 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe PID 548 wrote to memory of 916 548 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe 256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe"C:\Users\Admin\AppData\Local\Temp\256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe"C:\Users\Admin\AppData\Local\Temp\256394119ede05a8544c4c9ba964197bac7fa5c7aeccf58aef7c2b67bc0ddc45.exe"2⤵PID:916
-