Analysis

  • max time kernel
    34s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2022 20:55

General

  • Target

    fa494cb8c439fadfb6b67ed491513aa3c2fa1dfb4e0d03769ad909407a3b81f6.exe

  • Size

    2.0MB

  • MD5

    83aebff419895e406911862d5ee7a029

  • SHA1

    2d5545557538754a98258dc4cbf6af55fb065808

  • SHA256

    fa494cb8c439fadfb6b67ed491513aa3c2fa1dfb4e0d03769ad909407a3b81f6

  • SHA512

    ff3817928467ebad1821fad2d319d22a374863a0c3bbb70a5e2babf9256968fb427f9f7455f85dd506d3ac260eaa2ce177cdd64f998fabc40dbb57e6b8a7a1fa

Malware Config

Signatures

  • M00nd3v_Logger

    M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • M00nD3v Logger payload 1 IoCs

    Detects M00nD3v Logger payload in memory.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa494cb8c439fadfb6b67ed491513aa3c2fa1dfb4e0d03769ad909407a3b81f6.exe
    "C:\Users\Admin\AppData\Local\Temp\fa494cb8c439fadfb6b67ed491513aa3c2fa1dfb4e0d03769ad909407a3b81f6.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
      2⤵
        PID:900

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1524-54-0x00000000000B0000-0x00000000002B2000-memory.dmp
      Filesize

      2.0MB

    • memory/1524-55-0x0000000076311000-0x0000000076313000-memory.dmp
      Filesize

      8KB

    • memory/1524-56-0x0000000004EE0000-0x0000000004FA4000-memory.dmp
      Filesize

      784KB

    • memory/1524-57-0x00000000006B0000-0x00000000006D8000-memory.dmp
      Filesize

      160KB

    • memory/1524-58-0x00000000022D0000-0x0000000002360000-memory.dmp
      Filesize

      576KB