Analysis

  • max time kernel
    133s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    14-04-2022 13:34

General

  • Target

    72ccb540011728672247c24952d02002c665c65106a468f1312088f9082aab55.exe

  • Size

    1.7MB

  • MD5

    9520964aa4f84e6e16f1df161ce79479

  • SHA1

    eb054288a6f5dbbfcdb2038030bb38eb11d3dda9

  • SHA256

    72ccb540011728672247c24952d02002c665c65106a468f1312088f9082aab55

  • SHA512

    9bf36414a94daa5943d73988ac20495315ba8ec525a99816e417ef0b6ea023d7b7413632c5bf1e3a3623c792524454ce0b523f414f15fd52df5328706689b9d2

Malware Config

Signatures

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main Payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72ccb540011728672247c24952d02002c665c65106a468f1312088f9082aab55.exe
    "C:\Users\Admin\AppData\Local\Temp\72ccb540011728672247c24952d02002c665c65106a468f1312088f9082aab55.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3796
    • C:\Users\Admin\AppData\Local\Temp\72ccb540011728672247c24952d02002c665c65106a468f1312088f9082aab55.exe
      "C:\Users\Admin\AppData\Local\Temp\72ccb540011728672247c24952d02002c665c65106a468f1312088f9082aab55.exe"
      2⤵
      • Checks computer location settings
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • outlook_office_path
      • outlook_win_path
      PID:4748

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3796-133-0x0000000000DE0000-0x0000000000FA4000-memory.dmp

    Filesize

    1.8MB

  • memory/3796-134-0x0000000005F70000-0x0000000006514000-memory.dmp

    Filesize

    5.6MB

  • memory/3796-135-0x00000000059C0000-0x0000000005A52000-memory.dmp

    Filesize

    584KB

  • memory/3796-136-0x0000000005970000-0x000000000597A000-memory.dmp

    Filesize

    40KB

  • memory/3796-137-0x0000000009400000-0x0000000009476000-memory.dmp

    Filesize

    472KB

  • memory/3796-138-0x00000000093B0000-0x00000000093CE000-memory.dmp

    Filesize

    120KB

  • memory/4748-140-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/4748-141-0x00000000063A0000-0x0000000006406000-memory.dmp

    Filesize

    408KB

  • memory/4748-142-0x0000000006D20000-0x0000000006D70000-memory.dmp

    Filesize

    320KB

  • memory/4748-143-0x0000000006E10000-0x0000000006EAC000-memory.dmp

    Filesize

    624KB

  • memory/4748-144-0x0000000005003000-0x0000000005005000-memory.dmp

    Filesize

    8KB