Analysis
-
max time kernel
77s -
max time network
144s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
16-06-2020 09:51
Static task
static1
Behavioral task
behavioral1
Sample
ZIRAT BANKA.IFT MESAJI.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
ZIRAT BANKA.IFT MESAJI.exe
Resource
win10v200430
General
-
Target
ZIRAT BANKA.IFT MESAJI.exe
-
Size
1.2MB
-
MD5
96463f1796847224b85a96752b59ff17
-
SHA1
ca05cf6c0eac29a22d1296a15804cec36a908347
-
SHA256
1f1e1c079253f774dc02a7ff4e103a781573288802ba8c87af6790626fbcfca6
-
SHA512
cd27c0801d2d33ddb0ce26a769fd51e844f8ac7301079afab3c786822c529cb924b7db7e4a1992af77edf011ad4ffd586191a8754ca3738846605eb67acf3f5c
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\C8A579F880\Log.txt
masslogger
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
InstallUtil.exepid Process 384 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
InstallUtil.exepid Process 384 InstallUtil.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ZIRAT BANKA.IFT MESAJI.exeInstallUtil.exedescription pid Process Token: SeDebugPrivilege 804 ZIRAT BANKA.IFT MESAJI.exe Token: SeDebugPrivilege 384 InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ZIRAT BANKA.IFT MESAJI.exedescription pid Process procid_target PID 804 set thread context of 384 804 ZIRAT BANKA.IFT MESAJI.exe 24 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ZIRAT BANKA.IFT MESAJI.exedescription pid Process procid_target PID 804 wrote to memory of 384 804 ZIRAT BANKA.IFT MESAJI.exe 24 PID 804 wrote to memory of 384 804 ZIRAT BANKA.IFT MESAJI.exe 24 PID 804 wrote to memory of 384 804 ZIRAT BANKA.IFT MESAJI.exe 24 PID 804 wrote to memory of 384 804 ZIRAT BANKA.IFT MESAJI.exe 24 PID 804 wrote to memory of 384 804 ZIRAT BANKA.IFT MESAJI.exe 24 PID 804 wrote to memory of 384 804 ZIRAT BANKA.IFT MESAJI.exe 24 PID 804 wrote to memory of 384 804 ZIRAT BANKA.IFT MESAJI.exe 24 PID 804 wrote to memory of 384 804 ZIRAT BANKA.IFT MESAJI.exe 24 PID 804 wrote to memory of 384 804 ZIRAT BANKA.IFT MESAJI.exe 24 PID 804 wrote to memory of 384 804 ZIRAT BANKA.IFT MESAJI.exe 24 PID 804 wrote to memory of 384 804 ZIRAT BANKA.IFT MESAJI.exe 24 PID 804 wrote to memory of 384 804 ZIRAT BANKA.IFT MESAJI.exe 24 -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
InstallUtil.exepid Process 384 InstallUtil.exe -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
ZIRAT BANKA.IFT MESAJI.exeInstallUtil.exepid Process 804 ZIRAT BANKA.IFT MESAJI.exe 804 ZIRAT BANKA.IFT MESAJI.exe 804 ZIRAT BANKA.IFT MESAJI.exe 384 InstallUtil.exe 384 InstallUtil.exe -
Loads dropped DLL 1 IoCs
Processes:
ZIRAT BANKA.IFT MESAJI.exepid Process 804 ZIRAT BANKA.IFT MESAJI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZIRAT BANKA.IFT MESAJI.exe"C:\Users\Admin\AppData\Local\Temp\ZIRAT BANKA.IFT MESAJI.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Loads dropped DLL
PID:804 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:384
-