Analysis
-
max time kernel
91s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-06-2022 18:04
Static task
static1
Behavioral task
behavioral1
Sample
10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe
Resource
win10v2004-20220414-en
General
-
Target
10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe
-
Size
1.1MB
-
MD5
ef826a08ca7e802e0a5a5c61b58b2a80
-
SHA1
467f33a80dd20e33c0f89ebd69d265cbe109556d
-
SHA256
10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909
-
SHA512
cd51bec962ba2aa24ea5747111b9bf292591009cef084facaf56278ab338964b3149a2e6f9d4c2e17ceba15c2095d6af0081c7175ea841a661ca3fe9ef1c3dac
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 4 IoCs
resource yara_rule behavioral2/memory/3008-133-0x0000000000B80000-0x0000000000C06000-memory.dmp family_masslogger behavioral2/memory/3008-134-0x0000000000B80000-0x0000000000C06000-memory.dmp family_masslogger behavioral2/memory/3008-135-0x0000000000400000-0x000000000051E000-memory.dmp family_masslogger behavioral2/memory/3008-140-0x0000000000400000-0x000000000051E000-memory.dmp family_masslogger -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2688 set thread context of 3008 2688 10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe 81 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2688 10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe 2688 10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe 3008 10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe 3008 10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe 3488 powershell.exe 3488 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2688 10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3008 10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe Token: SeDebugPrivilege 3488 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2688 wrote to memory of 3008 2688 10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe 81 PID 2688 wrote to memory of 3008 2688 10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe 81 PID 2688 wrote to memory of 3008 2688 10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe 81 PID 3008 wrote to memory of 3488 3008 10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe 85 PID 3008 wrote to memory of 3488 3008 10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe 85 PID 3008 wrote to memory of 3488 3008 10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe"C:\Users\Admin\AppData\Local\Temp\10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe"C:\Users\Admin\AppData\Local\Temp\10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\10979f9fbee39c33046e940c5893569a1963d3c82de2627394e940ea070f0909.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-