Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-07-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
Wsp1Y2kaMZ5npFn.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Wsp1Y2kaMZ5npFn.exe
Resource
win10v2004-20240709-en
General
-
Target
Wsp1Y2kaMZ5npFn.exe
-
Size
866KB
-
MD5
05e6d0fec133b11165f4db25f7256682
-
SHA1
609af629da07ae0ebbe39c2de2502752f5e4553f
-
SHA256
6030faadae8d2aa1b94b06da9c0d4ed3ce33076a1bc04218027519b1043a6a95
-
SHA512
fd580785c67b8934ea27005c161258dfa8316631b35670a3e208c09464bab34a3b45d246763835dd7b02a9c104c237516e5a3dfb881d465c53e29f4f88c0be18
-
SSDEEP
12288:P+jP6eP9b2N+P7SeThWBfeiRR/Zqa5vQLuB0pnebzv019XdctgSq3X0OywVtBycv:GjP6+3P7SG8Rh51819tN7VtB7
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main payload 5 IoCs
resource yara_rule behavioral1/memory/2316-11-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/2316-10-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/2316-19-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/2316-16-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/2316-14-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger -
Deletes itself 1 IoCs
pid Process 2344 powershell.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2724 set thread context of 2316 2724 Wsp1Y2kaMZ5npFn.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wsp1Y2kaMZ5npFn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wsp1Y2kaMZ5npFn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2724 Wsp1Y2kaMZ5npFn.exe 2724 Wsp1Y2kaMZ5npFn.exe 2724 Wsp1Y2kaMZ5npFn.exe 2724 Wsp1Y2kaMZ5npFn.exe 2724 Wsp1Y2kaMZ5npFn.exe 2724 Wsp1Y2kaMZ5npFn.exe 2724 Wsp1Y2kaMZ5npFn.exe 2724 Wsp1Y2kaMZ5npFn.exe 2724 Wsp1Y2kaMZ5npFn.exe 2724 Wsp1Y2kaMZ5npFn.exe 2724 Wsp1Y2kaMZ5npFn.exe 2316 Wsp1Y2kaMZ5npFn.exe 2316 Wsp1Y2kaMZ5npFn.exe 2344 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2724 Wsp1Y2kaMZ5npFn.exe Token: SeDebugPrivilege 2316 Wsp1Y2kaMZ5npFn.exe Token: SeDebugPrivilege 2344 powershell.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2044 2724 Wsp1Y2kaMZ5npFn.exe 31 PID 2724 wrote to memory of 2044 2724 Wsp1Y2kaMZ5npFn.exe 31 PID 2724 wrote to memory of 2044 2724 Wsp1Y2kaMZ5npFn.exe 31 PID 2724 wrote to memory of 2044 2724 Wsp1Y2kaMZ5npFn.exe 31 PID 2724 wrote to memory of 2844 2724 Wsp1Y2kaMZ5npFn.exe 32 PID 2724 wrote to memory of 2844 2724 Wsp1Y2kaMZ5npFn.exe 32 PID 2724 wrote to memory of 2844 2724 Wsp1Y2kaMZ5npFn.exe 32 PID 2724 wrote to memory of 2844 2724 Wsp1Y2kaMZ5npFn.exe 32 PID 2724 wrote to memory of 2252 2724 Wsp1Y2kaMZ5npFn.exe 33 PID 2724 wrote to memory of 2252 2724 Wsp1Y2kaMZ5npFn.exe 33 PID 2724 wrote to memory of 2252 2724 Wsp1Y2kaMZ5npFn.exe 33 PID 2724 wrote to memory of 2252 2724 Wsp1Y2kaMZ5npFn.exe 33 PID 2724 wrote to memory of 2128 2724 Wsp1Y2kaMZ5npFn.exe 34 PID 2724 wrote to memory of 2128 2724 Wsp1Y2kaMZ5npFn.exe 34 PID 2724 wrote to memory of 2128 2724 Wsp1Y2kaMZ5npFn.exe 34 PID 2724 wrote to memory of 2128 2724 Wsp1Y2kaMZ5npFn.exe 34 PID 2724 wrote to memory of 2316 2724 Wsp1Y2kaMZ5npFn.exe 35 PID 2724 wrote to memory of 2316 2724 Wsp1Y2kaMZ5npFn.exe 35 PID 2724 wrote to memory of 2316 2724 Wsp1Y2kaMZ5npFn.exe 35 PID 2724 wrote to memory of 2316 2724 Wsp1Y2kaMZ5npFn.exe 35 PID 2724 wrote to memory of 2316 2724 Wsp1Y2kaMZ5npFn.exe 35 PID 2724 wrote to memory of 2316 2724 Wsp1Y2kaMZ5npFn.exe 35 PID 2724 wrote to memory of 2316 2724 Wsp1Y2kaMZ5npFn.exe 35 PID 2724 wrote to memory of 2316 2724 Wsp1Y2kaMZ5npFn.exe 35 PID 2724 wrote to memory of 2316 2724 Wsp1Y2kaMZ5npFn.exe 35 PID 2316 wrote to memory of 2344 2316 Wsp1Y2kaMZ5npFn.exe 37 PID 2316 wrote to memory of 2344 2316 Wsp1Y2kaMZ5npFn.exe 37 PID 2316 wrote to memory of 2344 2316 Wsp1Y2kaMZ5npFn.exe 37 PID 2316 wrote to memory of 2344 2316 Wsp1Y2kaMZ5npFn.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Wsp1Y2kaMZ5npFn.exe"C:\Users\Admin\AppData\Local\Temp\Wsp1Y2kaMZ5npFn.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\Wsp1Y2kaMZ5npFn.exe"{path}"2⤵PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\Wsp1Y2kaMZ5npFn.exe"{path}"2⤵PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\Wsp1Y2kaMZ5npFn.exe"{path}"2⤵PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\Wsp1Y2kaMZ5npFn.exe"{path}"2⤵PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\Wsp1Y2kaMZ5npFn.exe"{path}"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Wsp1Y2kaMZ5npFn.exe'3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-