Malware Analysis Report

2025-01-18 04:57

Sample ID 220328-zmqkgaehg3
Target 5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc
SHA256 5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc
Tags
masslogger collection spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc

Threat Level: Known bad

The file 5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc was found to be: Known bad.

Malicious Activity Summary

masslogger collection spyware stealer

MassLogger

MassLogger Main Payload

Drops startup file

Reads user/profile data of web browsers

Deletes itself

Checks computer location settings

Looks up external IP address via web service

Accesses Microsoft Outlook profiles

Suspicious use of SetThreadContext

Suspicious use of SetWindowsHookEx

outlook_win_path

Suspicious behavior: AddClipboardFormatListener

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

outlook_office_path

Suspicious use of WriteProcessMemory

Suspicious behavior: MapViewOfSection

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-03-28 20:50

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-03-28 20:50

Reported

2022-03-29 02:27

Platform

win7-20220311-en

Max time kernel

4294180s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe"

Signatures

MassLogger

stealer spyware masslogger

MassLogger Main Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BBBBBBBBB.vbs C:\Windows\SysWOW64\notepad.exe N/A

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1752 wrote to memory of 580 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\notepad.exe
PID 1752 wrote to memory of 580 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\notepad.exe
PID 1752 wrote to memory of 580 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\notepad.exe
PID 1752 wrote to memory of 580 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\notepad.exe
PID 1752 wrote to memory of 580 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\notepad.exe
PID 1752 wrote to memory of 580 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\notepad.exe
PID 1752 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe
PID 1752 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe
PID 1752 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe
PID 1752 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe
PID 1944 wrote to memory of 1564 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1944 wrote to memory of 1564 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1944 wrote to memory of 1564 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1944 wrote to memory of 1564 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1944 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1944 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1944 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1944 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

outlook_office_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A

outlook_win_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe

"C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe"

C:\Windows\SysWOW64\notepad.exe

"C:\Windows\system32\notepad.exe"

C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe

"C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"powershell" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe'

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"powershell" Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe'

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.ipify.org udp
US 52.20.78.240:80 api.ipify.org tcp
US 8.8.8.8:53 mail.paminakids.com udp
TR 77.245.159.43:587 mail.paminakids.com tcp

Files

memory/1752-56-0x0000000075BB1000-0x0000000075BB3000-memory.dmp

memory/1752-55-0x00000000002C0000-0x00000000002D5000-memory.dmp

memory/580-57-0x0000000000000000-mapping.dmp

memory/580-58-0x0000000000080000-0x0000000000081000-memory.dmp

memory/1944-62-0x000000000051C750-mapping.dmp

memory/1944-64-0x0000000000520000-0x00000000005A6000-memory.dmp

memory/1944-63-0x0000000000520000-0x00000000005A6000-memory.dmp

memory/1944-67-0x0000000002152000-0x0000000002153000-memory.dmp

memory/1944-66-0x0000000002152000-0x0000000002153000-memory.dmp

memory/1944-69-0x0000000002152000-0x0000000002153000-memory.dmp

memory/1944-68-0x0000000002152000-0x0000000002153000-memory.dmp

memory/1944-70-0x0000000002152000-0x0000000002153000-memory.dmp

memory/1944-72-0x0000000002152000-0x0000000002153000-memory.dmp

memory/1944-71-0x0000000002152000-0x0000000002153000-memory.dmp

memory/1944-74-0x0000000002152000-0x0000000002153000-memory.dmp

memory/1944-73-0x0000000002152000-0x0000000002153000-memory.dmp

memory/1944-75-0x0000000002152000-0x0000000002153000-memory.dmp

memory/1564-76-0x0000000000000000-mapping.dmp

memory/1944-78-0x0000000006210000-0x000000000624E000-memory.dmp

memory/1944-79-0x0000000006270000-0x0000000006300000-memory.dmp

memory/1944-80-0x0000000004CE5000-0x0000000004CF6000-memory.dmp

memory/1564-81-0x000000006F580000-0x000000006FB2B000-memory.dmp

memory/1564-82-0x0000000002590000-0x00000000031DA000-memory.dmp

memory/1688-83-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

MD5 37ec93163e86fd60024c3b7752d00cfc
SHA1 2322a736ac0b7efcc015a82f5e9553f8bdfc6f53
SHA256 d60baa63637c7c849c37164f2bc863952c0f9dd5cd33a07e9ff511d9d1f043e1
SHA512 939b341f6cff442e70a363e5e40a375d6da7b3b92694c10883b5f453c7232196e2143c5d7d15d4e84c7b7e3b66d9b9307346a0741c1deb5715f1b2b8392c5af2

memory/1688-86-0x0000000074710000-0x0000000074CBB000-memory.dmp

memory/1688-87-0x00000000023B2000-0x00000000023B4000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-03-28 20:50

Reported

2022-03-29 02:27

Platform

win10v2004-en-20220113

Max time kernel

128s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe"

Signatures

MassLogger

stealer spyware masslogger

MassLogger Main Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BBBBBBBBB.vbs C:\Windows\SysWOW64\notepad.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3668 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\notepad.exe
PID 3668 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\notepad.exe
PID 3668 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\notepad.exe
PID 3668 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\notepad.exe
PID 3668 wrote to memory of 1804 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\notepad.exe
PID 3668 wrote to memory of 1152 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe
PID 3668 wrote to memory of 1152 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe
PID 3668 wrote to memory of 1152 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe
PID 1152 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1152 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1152 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

Processes

C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe

"C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe"

C:\Windows\SysWOW64\notepad.exe

"C:\Windows\system32\notepad.exe"

C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe

"C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"powershell" Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\5f8a84bc4ecfc9e800e1d5e1c2bfa79acfa9548983769b70289d9b19943cb4bc.exe'

Network

Files

memory/3668-131-0x0000000002160000-0x0000000002175000-memory.dmp

memory/1804-132-0x0000000000000000-mapping.dmp

memory/1152-133-0x0000000000000000-mapping.dmp

memory/1152-134-0x0000000000A80000-0x0000000000B06000-memory.dmp

memory/1152-135-0x0000000000A80000-0x0000000000B06000-memory.dmp

memory/1152-136-0x0000000000BF2000-0x0000000000BF3000-memory.dmp

memory/1152-137-0x0000000000BF2000-0x0000000000BF3000-memory.dmp

memory/1152-138-0x0000000000BF2000-0x0000000000BF3000-memory.dmp

memory/1152-140-0x0000000000BF2000-0x0000000000BF3000-memory.dmp

memory/1152-139-0x0000000000BF2000-0x0000000000BF3000-memory.dmp

memory/1152-141-0x0000000000BF2000-0x0000000000BF3000-memory.dmp

memory/1152-143-0x0000000000BF2000-0x0000000000BF3000-memory.dmp

memory/1152-142-0x0000000000BF2000-0x0000000000BF3000-memory.dmp

memory/1152-145-0x0000000000BF2000-0x0000000000BF3000-memory.dmp

memory/1152-144-0x0000000000BF2000-0x0000000000BF3000-memory.dmp

memory/1152-146-0x0000000004E80000-0x0000000004F12000-memory.dmp

memory/1152-147-0x0000000005190000-0x0000000005734000-memory.dmp

memory/1152-148-0x0000000005740000-0x00000000057A6000-memory.dmp

memory/2848-149-0x0000000000000000-mapping.dmp

memory/2848-150-0x0000000002DE0000-0x0000000002E16000-memory.dmp

memory/2848-151-0x00000000058B0000-0x0000000005ED8000-memory.dmp

memory/2848-152-0x0000000005820000-0x0000000005842000-memory.dmp

memory/2848-153-0x0000000006010000-0x0000000006076000-memory.dmp

memory/2848-154-0x00000000066F0000-0x000000000670E000-memory.dmp

memory/2848-155-0x0000000007F40000-0x00000000085BA000-memory.dmp

memory/2848-156-0x0000000006BE0000-0x0000000006BFA000-memory.dmp

memory/2848-157-0x0000000002E65000-0x0000000002E67000-memory.dmp

memory/2848-158-0x0000000007960000-0x00000000079F6000-memory.dmp

memory/2848-159-0x0000000006CC0000-0x0000000006CE2000-memory.dmp