Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
17-08-2023 18:24
Static task
static1
Behavioral task
behavioral1
Sample
DHLINV1708023 - 1301512300.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
DHLINV1708023 - 1301512300.exe
Resource
win10v2004-20230703-en
General
-
Target
DHLINV1708023 - 1301512300.exe
-
Size
998KB
-
MD5
d36de44bf023570b2f83fde6e95842dd
-
SHA1
b9200cb7cbf75f8f399ec7752a7dfaef5f3acf12
-
SHA256
29ea2e83d8bb49b7b646895e04c08bf60760a79cec2d761ccbee7704216323cf
-
SHA512
2b8847f1dfcdc4fdddd0a6830e61f56776f1f1335418b5c73fa49a760ed32003a77a0829ea712e81aac81457425079183cc6fc6912a35dbfc61d78c946530ffd
-
SSDEEP
12288:g2iNsXDl+CPLnid2sxF+pAz127hoc5etv4GuHkkz0FxycEgh2uWM+kz:g1g7LQqdRQAHkkzkTh2uB+kz
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main payload 1 IoCs
resource yara_rule behavioral1/memory/3008-62-0x0000000004F50000-0x0000000004FD4000-memory.dmp family_masslogger -
Deletes itself 1 IoCs
pid Process 2928 powershell.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3008 DHLINV1708023 - 1301512300.exe 3008 DHLINV1708023 - 1301512300.exe 3008 DHLINV1708023 - 1301512300.exe 3008 DHLINV1708023 - 1301512300.exe 2928 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3008 DHLINV1708023 - 1301512300.exe Token: SeDebugPrivilege 2928 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2936 3008 DHLINV1708023 - 1301512300.exe 31 PID 3008 wrote to memory of 2936 3008 DHLINV1708023 - 1301512300.exe 31 PID 3008 wrote to memory of 2936 3008 DHLINV1708023 - 1301512300.exe 31 PID 3008 wrote to memory of 2936 3008 DHLINV1708023 - 1301512300.exe 31 PID 2936 wrote to memory of 2928 2936 cmd.exe 33 PID 2936 wrote to memory of 2928 2936 cmd.exe 33 PID 2936 wrote to memory of 2928 2936 cmd.exe 33 PID 2936 wrote to memory of 2928 2936 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHLINV1708023 - 1301512300.exe"C:\Users\Admin\AppData\Local\Temp\DHLINV1708023 - 1301512300.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\DHLINV1708023 - 1301512300.exe' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\DHLINV1708023 - 1301512300.exe'3⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-