Analysis

  • max time kernel
    91s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    15-06-2022 23:50

General

  • Target

    SecuriteInfo.com.Trojan.GenericKD.50428043.31193.exe

  • Size

    1005KB

  • MD5

    013106940b067393d0458736ed44b179

  • SHA1

    6a461570410fbfbf9006ee0cc9be2d5f9c363b04

  • SHA256

    0d98cc703438cff3cc32a2bd01032c9234cae7c6e4c375047d0260b5d0b5e783

  • SHA512

    d14a9b0a5c965fe730a9ce45cf7b3ec801308dd3186ac5be1578c706312c6ad46e31a895244286a0f75dfaf39529a459c7ff0f83e3dc2c00257bae665ce68c51

Malware Config

Signatures

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main Payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.50428043.31193.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.50428043.31193.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.50428043.31193.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.50428043.31193.exe"
      2⤵
        PID:4804
      • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.50428043.31193.exe
        "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.50428043.31193.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4680
        • C:\Windows\SysWOW64\cmd.exe
          "cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.50428043.31193.exe' & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1888
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.50428043.31193.exe'
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1720

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.GenericKD.50428043.31193.exe.log
      Filesize

      1KB

      MD5

      8323fae9fbc8238dfd3efdc87ac3534c

      SHA1

      d88623828a38d6b528963a32902c9f336a08942e

      SHA256

      1ccd81d339d51696fa8569e0ea179873452e8aa087b14a397538cda74996fe00

      SHA512

      9a50d78360761b85c2b49fd2959744c004a74600ffef5756391fec0f02c8aafc6061a028518808693297f03e9fc65067e3d4b29d876ed70eb8e2ad9094d246c3

    • memory/1720-141-0x0000000000000000-mapping.dmp
    • memory/1720-150-0x0000000006E50000-0x0000000006E72000-memory.dmp
      Filesize

      136KB

    • memory/1720-149-0x0000000007AE0000-0x0000000007B76000-memory.dmp
      Filesize

      600KB

    • memory/1720-148-0x0000000006D60000-0x0000000006D7A000-memory.dmp
      Filesize

      104KB

    • memory/1720-147-0x0000000007EC0000-0x000000000853A000-memory.dmp
      Filesize

      6.5MB

    • memory/1720-146-0x0000000006870000-0x000000000688E000-memory.dmp
      Filesize

      120KB

    • memory/1720-145-0x00000000061C0000-0x0000000006226000-memory.dmp
      Filesize

      408KB

    • memory/1720-144-0x00000000058C0000-0x00000000058E2000-memory.dmp
      Filesize

      136KB

    • memory/1720-143-0x00000000059A0000-0x0000000005FC8000-memory.dmp
      Filesize

      6.2MB

    • memory/1720-142-0x0000000002FA0000-0x0000000002FD6000-memory.dmp
      Filesize

      216KB

    • memory/1888-140-0x0000000000000000-mapping.dmp
    • memory/2964-130-0x0000000000650000-0x0000000000752000-memory.dmp
      Filesize

      1.0MB

    • memory/2964-135-0x000000000ADB0000-0x000000000AE16000-memory.dmp
      Filesize

      408KB

    • memory/2964-134-0x00000000096F0000-0x000000000978C000-memory.dmp
      Filesize

      624KB

    • memory/2964-133-0x0000000007670000-0x000000000767A000-memory.dmp
      Filesize

      40KB

    • memory/2964-132-0x00000000075D0000-0x0000000007662000-memory.dmp
      Filesize

      584KB

    • memory/2964-131-0x0000000007AE0000-0x0000000008084000-memory.dmp
      Filesize

      5.6MB

    • memory/4680-138-0x0000000000400000-0x0000000000484000-memory.dmp
      Filesize

      528KB

    • memory/4680-137-0x0000000000000000-mapping.dmp
    • memory/4804-136-0x0000000000000000-mapping.dmp