Analysis Overview
SHA256
b5a3cf350d8aa4afa017d90a37e3206574774eefc57c36da525a89606d704025
Threat Level: Known bad
The file Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe was found to be: Known bad.
Malicious Activity Summary
MassLogger
MassLogger Main Payload
Checks computer location settings
Reads user/profile data of web browsers
Looks up external IP address via web service
Suspicious use of SetThreadContext
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: MapViewOfSection
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2021-01-12 17:59
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2021-01-12 17:59
Reported
2021-01-12 18:01
Platform
win7v20201028
Max time kernel
13s
Max time network
108s
Command Line
Signatures
MassLogger
MassLogger Main Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
Reads user/profile data of web browsers
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.ipify.org | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1824 set thread context of 1328 | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe
"C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe"
C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe
"C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | api.ipify.org | udp |
| N/A | 184.73.247.141:80 | api.ipify.org | tcp |
Files
memory/1328-2-0x0000000000400000-0x0000000000496000-memory.dmp
memory/1328-3-0x000000000040188B-mapping.dmp
memory/1328-4-0x0000000000400000-0x0000000000496000-memory.dmp
memory/1328-5-0x0000000073980000-0x000000007406E000-memory.dmp
memory/1328-6-0x0000000000720000-0x00000000007A1000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2021-01-12 17:59
Reported
2021-01-12 18:01
Platform
win10v20201028
Max time kernel
17s
Max time network
114s
Command Line
Signatures
MassLogger
MassLogger Main Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
Reads user/profile data of web browsers
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.ipify.org | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 656 set thread context of 480 | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 656 wrote to memory of 480 | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe |
| PID 656 wrote to memory of 480 | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe |
| PID 656 wrote to memory of 480 | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe |
| PID 656 wrote to memory of 480 | N/A | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe | C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe
"C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe"
C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe
"C:\Users\Admin\AppData\Local\Temp\Our New Order Jan 12 2020 at 2.30_PVV940_PDF.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | api.ipify.org | udp |
| N/A | 54.235.142.93:80 | api.ipify.org | tcp |
Files
memory/480-2-0x0000000000400000-0x0000000000496000-memory.dmp
memory/480-3-0x000000000040188B-mapping.dmp
memory/656-4-0x000000001A4A0000-0x000000001A536000-memory.dmp
memory/480-5-0x0000000000400000-0x0000000000496000-memory.dmp
memory/480-6-0x0000000073FB0000-0x000000007469E000-memory.dmp
memory/480-7-0x0000000004E90000-0x0000000004F11000-memory.dmp
memory/480-9-0x00000000054A0000-0x00000000054A1000-memory.dmp
memory/480-10-0x0000000005A40000-0x0000000005A41000-memory.dmp
memory/480-11-0x00000000062B0000-0x00000000062B1000-memory.dmp
memory/480-12-0x0000000006BA0000-0x0000000006BA1000-memory.dmp
memory/480-13-0x0000000006B50000-0x0000000006B51000-memory.dmp
memory/480-14-0x0000000006C90000-0x0000000006C91000-memory.dmp