Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 05:52
Static task
static1
Behavioral task
behavioral1
Sample
QUOTE CIF PRICES FOR ATTACHED.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
QUOTE CIF PRICES FOR ATTACHED.exe
Resource
win10v2004-20240802-en
General
-
Target
QUOTE CIF PRICES FOR ATTACHED.exe
-
Size
1.0MB
-
MD5
4fb2fccce8717ef3702f39eb45167924
-
SHA1
103fbc869ca69a5cfd0bc6dbb81f4c2c41bc1ad9
-
SHA256
9dfba413d306830589105d96b90b5ea870b1975bd371350635ea1c2b591bcbd8
-
SHA512
1cf81de30c86b70e883b29b7203454f35280400462d4c03d42ef6a548dec7010f18b8134d7aa34209c82ae500247c5ee25bc9d371d08d849597744322cb72547
-
SSDEEP
24576:vZMVw2cA4qlsd7SbJG9XD57i8xnpBMUerG5CQEgB:xMW2cAadubQ9zTxTM1S5HEg
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1096-12-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral1/memory/1096-18-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral1/memory/1096-20-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral1/memory/1096-23-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral1/memory/1096-14-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger -
Deletes itself 1 IoCs
Processes:
powershell.exepid Process 1032 powershell.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
QUOTE CIF PRICES FOR ATTACHED.exedescription pid Process procid_target PID 3032 set thread context of 1096 3032 QUOTE CIF PRICES FOR ATTACHED.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
QUOTE CIF PRICES FOR ATTACHED.execmd.exepowershell.exeQUOTE CIF PRICES FOR ATTACHED.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QUOTE CIF PRICES FOR ATTACHED.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QUOTE CIF PRICES FOR ATTACHED.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
QUOTE CIF PRICES FOR ATTACHED.exepowershell.exepid Process 1096 QUOTE CIF PRICES FOR ATTACHED.exe 1096 QUOTE CIF PRICES FOR ATTACHED.exe 1032 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
QUOTE CIF PRICES FOR ATTACHED.exepowershell.exedescription pid Process Token: SeDebugPrivilege 1096 QUOTE CIF PRICES FOR ATTACHED.exe Token: SeDebugPrivilege 1032 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
QUOTE CIF PRICES FOR ATTACHED.exeQUOTE CIF PRICES FOR ATTACHED.execmd.exedescription pid Process procid_target PID 3032 wrote to memory of 1096 3032 QUOTE CIF PRICES FOR ATTACHED.exe 31 PID 3032 wrote to memory of 1096 3032 QUOTE CIF PRICES FOR ATTACHED.exe 31 PID 3032 wrote to memory of 1096 3032 QUOTE CIF PRICES FOR ATTACHED.exe 31 PID 3032 wrote to memory of 1096 3032 QUOTE CIF PRICES FOR ATTACHED.exe 31 PID 3032 wrote to memory of 1096 3032 QUOTE CIF PRICES FOR ATTACHED.exe 31 PID 3032 wrote to memory of 1096 3032 QUOTE CIF PRICES FOR ATTACHED.exe 31 PID 3032 wrote to memory of 1096 3032 QUOTE CIF PRICES FOR ATTACHED.exe 31 PID 3032 wrote to memory of 1096 3032 QUOTE CIF PRICES FOR ATTACHED.exe 31 PID 3032 wrote to memory of 1096 3032 QUOTE CIF PRICES FOR ATTACHED.exe 31 PID 1096 wrote to memory of 2960 1096 QUOTE CIF PRICES FOR ATTACHED.exe 33 PID 1096 wrote to memory of 2960 1096 QUOTE CIF PRICES FOR ATTACHED.exe 33 PID 1096 wrote to memory of 2960 1096 QUOTE CIF PRICES FOR ATTACHED.exe 33 PID 1096 wrote to memory of 2960 1096 QUOTE CIF PRICES FOR ATTACHED.exe 33 PID 2960 wrote to memory of 1032 2960 cmd.exe 35 PID 2960 wrote to memory of 1032 2960 cmd.exe 35 PID 2960 wrote to memory of 1032 2960 cmd.exe 35 PID 2960 wrote to memory of 1032 2960 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTE CIF PRICES FOR ATTACHED.exe"C:\Users\Admin\AppData\Local\Temp\QUOTE CIF PRICES FOR ATTACHED.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\QUOTE CIF PRICES FOR ATTACHED.exe"C:\Users\Admin\AppData\Local\Temp\QUOTE CIF PRICES FOR ATTACHED.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\QUOTE CIF PRICES FOR ATTACHED.exe' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\QUOTE CIF PRICES FOR ATTACHED.exe'4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-
-