Analysis Overview
SHA256
e9a5126c1aa2b05a1e6244a08284689dfff56fbb12a94eb05d8bf563ee3cad62
Threat Level: Known bad
The file e79a4eb2_extracted was found to be: Known bad.
Malicious Activity Summary
MassLogger Main Payload
MassLogger
MassLogger log file
Masslogger family
Checks computer location settings
Reads user/profile data of web browsers
Looks up external IP address via web service
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2021-02-16 17:41
Signatures
MassLogger Main Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Masslogger family
Analysis: behavioral1
Detonation Overview
Submitted
2021-02-16 17:41
Reported
2021-02-16 17:44
Platform
win7v20201028
Max time kernel
22s
Max time network
29s
Command Line
Signatures
MassLogger
MassLogger log file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\e79a4eb2_extracted.exe | N/A |
Reads user/profile data of web browsers
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.ipify.org | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e79a4eb2_extracted.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\e79a4eb2_extracted.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\e79a4eb2_extracted.exe
"C:\Users\Admin\AppData\Local\Temp\e79a4eb2_extracted.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 8.8.8.8:53 | api.ipify.org | udp |
| N/A | 23.21.140.41:80 | api.ipify.org | tcp |
| N/A | 8.8.8.8:53 | smtp.yandex.com | udp |
| N/A | 77.88.21.158:587 | smtp.yandex.com | tcp |
| N/A | 8.8.8.8:53 | repository.certum.pl | udp |
| N/A | 2.19.195.17:80 | repository.certum.pl | tcp |
| N/A | 8.8.8.8:53 | www.download.windowsupdate.com | udp |
Files
memory/1784-2-0x0000000073E00000-0x00000000744EE000-memory.dmp
memory/1784-3-0x00000000001C0000-0x00000000001C1000-memory.dmp
memory/1784-5-0x0000000000300000-0x000000000033E000-memory.dmp
memory/1784-6-0x0000000004300000-0x0000000004301000-memory.dmp
memory/1784-7-0x0000000004305000-0x0000000004316000-memory.dmp
memory/1784-8-0x0000000001F50000-0x0000000001F5F000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2021-02-16 17:41
Reported
2021-02-16 17:44
Platform
win10v20201028
Max time kernel
24s
Max time network
112s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 636 wrote to memory of 2316 | N/A | C:\Users\Admin\AppData\Local\Temp\e79a4eb2_extracted.exe | C:\Windows\SysWOW64\cmd.exe |
| PID 636 wrote to memory of 2316 | N/A | C:\Users\Admin\AppData\Local\Temp\e79a4eb2_extracted.exe | C:\Windows\SysWOW64\cmd.exe |
| PID 636 wrote to memory of 2316 | N/A | C:\Users\Admin\AppData\Local\Temp\e79a4eb2_extracted.exe | C:\Windows\SysWOW64\cmd.exe |
| PID 2316 wrote to memory of 1480 | N/A | C:\Windows\SysWOW64\cmd.exe | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
| PID 2316 wrote to memory of 1480 | N/A | C:\Windows\SysWOW64\cmd.exe | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
| PID 2316 wrote to memory of 1480 | N/A | C:\Windows\SysWOW64\cmd.exe | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\e79a4eb2_extracted.exe
"C:\Users\Admin\AppData\Local\Temp\e79a4eb2_extracted.exe"
C:\Windows\SysWOW64\cmd.exe
"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\e79a4eb2_extracted.exe' & exit
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\e79a4eb2_extracted.exe'
Network
Files
memory/636-2-0x0000000073190000-0x000000007387E000-memory.dmp
memory/636-3-0x00000000002B0000-0x00000000002B1000-memory.dmp
memory/636-5-0x0000000005200000-0x0000000005201000-memory.dmp
memory/636-6-0x0000000004DA0000-0x0000000004DA1000-memory.dmp
memory/636-7-0x0000000004D00000-0x0000000004D3E000-memory.dmp
memory/636-8-0x0000000004CF0000-0x0000000004CF1000-memory.dmp
memory/636-9-0x0000000005700000-0x0000000005701000-memory.dmp
memory/636-10-0x0000000005770000-0x0000000005771000-memory.dmp
memory/2316-11-0x0000000000000000-mapping.dmp
memory/1480-12-0x0000000000000000-mapping.dmp