Analysis

  • max time kernel
    72s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    30-08-2020 06:01

General

  • Target

    60091743pdf.exe

  • Size

    1.1MB

  • MD5

    c9b3ce0f3c3350621b6df632369a58f8

  • SHA1

    ac29d51d75264cad92760259a8b2a4c358516975

  • SHA256

    9bf180bb7b3cc0fcc6d01b68e2aa82d2f853e081ec71e34942d875324a2415b4

  • SHA512

    96a329657409994e8485ded30d9dce953ee19489ab6242df62a2cade14ea107b328043c7ec7c024c3151370c41a16e12fa3ef3bc5371796d436c723b8a3da690

Malware Config

Signatures

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main Payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60091743pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\60091743pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nwwFxKnJy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8A26.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1608
    • C:\Users\Admin\AppData\Local\Temp\60091743pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\60091743pdf.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1576

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp8A26.tmp

    MD5

    f70d9bb96b15c557a3ead5fdba69bec3

    SHA1

    da09aee283c311ade112ae38d3ae62f5c3dfed67

    SHA256

    f274c34195a537054b112980634071ab6c8f0cd2a63d48ee3d8e80ce3e09e064

    SHA512

    8148c50be54076e0a4237d217b42fb9e27673dde1d0b02636abc93adc5e435491d2697fd6cac59309fabc9d3085178513859ed2c9a7b8627e3fbc231df3a1db4

  • memory/868-0-0x0000000074650000-0x0000000074D3E000-memory.dmp

    Filesize

    6.9MB

  • memory/868-1-0x0000000000AB0000-0x0000000000AB1000-memory.dmp

    Filesize

    4KB

  • memory/868-3-0x00000000004B0000-0x00000000004BB000-memory.dmp

    Filesize

    44KB

  • memory/868-4-0x0000000005F80000-0x000000000603E000-memory.dmp

    Filesize

    760KB

  • memory/868-5-0x0000000005D10000-0x0000000005DA2000-memory.dmp

    Filesize

    584KB

  • memory/1576-8-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1576-9-0x0000000000481C2E-mapping.dmp

  • memory/1576-10-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1576-11-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1576-12-0x0000000074650000-0x0000000074D3E000-memory.dmp

    Filesize

    6.9MB

  • memory/1608-6-0x0000000000000000-mapping.dmp