Analysis
-
max time kernel
62s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2022 15:44
Behavioral task
behavioral1
Sample
masslogger.bin.exe
Resource
win7-20220812-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
masslogger.bin.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
masslogger.bin.exe
-
Size
499KB
-
MD5
3c05e9000f006c7f1549153e7b54e74c
-
SHA1
b6ca7834020470508a9c205d57621d2a2d025d02
-
SHA256
7187a6d2980e3696396c4fbce939eeeb3733b6afdf2e859a385f8d6b29e8cebc
-
SHA512
49aec1bf566ca03b38579afd1ea2aa8bed5e78215c83392428b7f36b01117196005e05852af5f862b02228fb9791ed20b0a3493f8cc43109d8d14d11a058adb1
-
SSDEEP
6144:MtUXsvIucbyO6+trL99ZgLIRbgvbeXKWfcUTNKMDMAlcn38OxKl9x7qs9Pxcm0AE:MSe1uX3ukCvoBCMDMVqfBdcmDB
Score
10/10
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main payload 1 IoCs
resource yara_rule behavioral2/memory/4808-132-0x00000000007F0000-0x0000000000874000-memory.dmp family_masslogger -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4808 masslogger.bin.exe 4808 masslogger.bin.exe 3556 powershell.exe 3556 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4808 masslogger.bin.exe Token: SeDebugPrivilege 3556 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4808 wrote to memory of 3520 4808 masslogger.bin.exe 83 PID 4808 wrote to memory of 3520 4808 masslogger.bin.exe 83 PID 4808 wrote to memory of 3520 4808 masslogger.bin.exe 83 PID 3520 wrote to memory of 3556 3520 cmd.exe 85 PID 3520 wrote to memory of 3556 3520 cmd.exe 85 PID 3520 wrote to memory of 3556 3520 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\masslogger.bin.exe"C:\Users\Admin\AppData\Local\Temp\masslogger.bin.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\masslogger.bin.exe' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\masslogger.bin.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-