Analysis

  • max time kernel
    83s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    18/04/2022, 12:46

General

  • Target

    aecd5c9bc22ea3837f60e4b9420315cbd534b1e36d89c94c4d6a60f22bd1cb56.exe

  • Size

    743KB

  • MD5

    11356b26bfc57d2aba5a7fcb62a014d4

  • SHA1

    1ff419aa21d8923712fb407c254d289e05bc012e

  • SHA256

    aecd5c9bc22ea3837f60e4b9420315cbd534b1e36d89c94c4d6a60f22bd1cb56

  • SHA512

    e59bb6073936394ec2804cc527b48f902755523c2eb59d06c8a48b666a504031d816ec76acf67ab59993afb1f8a7e6ceb10d028a5a8b27ebefb12542492d2740

Malware Config

Signatures

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main Payload 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aecd5c9bc22ea3837f60e4b9420315cbd534b1e36d89c94c4d6a60f22bd1cb56.exe
    "C:\Users\Admin\AppData\Local\Temp\aecd5c9bc22ea3837f60e4b9420315cbd534b1e36d89c94c4d6a60f22bd1cb56.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Users\Admin\AppData\Local\Temp\aecd5c9bc22ea3837f60e4b9420315cbd534b1e36d89c94c4d6a60f22bd1cb56.exe
      "{path}"
      2⤵
        PID:1796
      • C:\Users\Admin\AppData\Local\Temp\aecd5c9bc22ea3837f60e4b9420315cbd534b1e36d89c94c4d6a60f22bd1cb56.exe
        "{path}"
        2⤵
          PID:1808
        • C:\Users\Admin\AppData\Local\Temp\aecd5c9bc22ea3837f60e4b9420315cbd534b1e36d89c94c4d6a60f22bd1cb56.exe
          "{path}"
          2⤵
          • Checks computer location settings
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • outlook_office_path
          • outlook_win_path
          PID:956

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/836-54-0x0000000000120000-0x00000000001E0000-memory.dmp

        Filesize

        768KB

      • memory/836-55-0x0000000000790000-0x00000000007AE000-memory.dmp

        Filesize

        120KB

      • memory/836-56-0x000000000A340000-0x000000000A3F0000-memory.dmp

        Filesize

        704KB

      • memory/956-57-0x0000000000400000-0x0000000000486000-memory.dmp

        Filesize

        536KB

      • memory/956-58-0x0000000000400000-0x0000000000486000-memory.dmp

        Filesize

        536KB

      • memory/956-60-0x0000000000400000-0x0000000000486000-memory.dmp

        Filesize

        536KB

      • memory/956-61-0x0000000000400000-0x0000000000486000-memory.dmp

        Filesize

        536KB

      • memory/956-62-0x0000000000400000-0x0000000000486000-memory.dmp

        Filesize

        536KB

      • memory/956-65-0x0000000000400000-0x0000000000486000-memory.dmp

        Filesize

        536KB

      • memory/956-67-0x0000000000400000-0x0000000000486000-memory.dmp

        Filesize

        536KB

      • memory/956-68-0x0000000004CF5000-0x0000000004D06000-memory.dmp

        Filesize

        68KB