Analysis

  • max time kernel
    148s
  • max time network
    89s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-04-2022 08:57

General

  • Target

    b78442ab204b03b70021c64336e5b1481ef2ecda74d6d6cead0af13fc1d9b44e.exe

  • Size

    1.0MB

  • MD5

    8802b4bf7ac58aacf4e9c21e90b79df7

  • SHA1

    d60038c985976958202eaa6326e222e418865863

  • SHA256

    b78442ab204b03b70021c64336e5b1481ef2ecda74d6d6cead0af13fc1d9b44e

  • SHA512

    89fcf9ab5af4401745d858dac2476d1ebff1e2a58cd6174ad3898054d96451991786763770020d25c79094447724f7d14ecd2ebaf4e7141bf8f50fa52f7f3f67

Malware Config

Signatures

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main Payload 1 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Executes dropped EXE 2 IoCs
  • Looks for VMWare Tools registry key 2 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b78442ab204b03b70021c64336e5b1481ef2ecda74d6d6cead0af13fc1d9b44e.exe
    "C:\Users\Admin\AppData\Local\Temp\b78442ab204b03b70021c64336e5b1481ef2ecda74d6d6cead0af13fc1d9b44e.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4720
    • C:\Users\Admin\AppData\Local\Temp\b78442ab204b03b70021c64336e5b1481ef2ecda74d6d6cead0af13fc1d9b44e.exe
      "C:\Users\Admin\AppData\Local\Temp\b78442ab204b03b70021c64336e5b1481ef2ecda74d6d6cead0af13fc1d9b44e.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4964
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn hostlasco.exe /tr '"C:\Users\Admin\AppData\Local\Temp\submaild\hostlasco.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4112
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn hostlasco.exe /tr '"C:\Users\Admin\AppData\Local\Temp\submaild\hostlasco.exe"'
          4⤵
          • Creates scheduled task(s)
          PID:4472
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAC7C.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4276
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:4528
        • C:\Users\Admin\AppData\Local\Temp\submaild\hostlasco.exe
          "C:\Users\Admin\AppData\Local\Temp\submaild\hostlasco.exe"
          4⤵
          • Executes dropped EXE
          • Checks BIOS information in registry
          • Maps connected drives based on registry
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4412
          • C:\Users\Admin\AppData\Local\Temp\submaild\hostlasco.exe
            "C:\Users\Admin\AppData\Local\Temp\submaild\hostlasco.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3512

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\b78442ab204b03b70021c64336e5b1481ef2ecda74d6d6cead0af13fc1d9b44e.exe.log

    Filesize

    1KB

    MD5

    39c80e11c25478a5d6863f9ec7c44834

    SHA1

    f29c08656792b274ef6da35b0071fa93e45ca940

    SHA256

    7a0cb24b4ab253688e19c863fa1d2da3c640228fa53e7aacc78b22fb7a6c4c99

    SHA512

    8095d6f3d95d783d37aee06e7d2d3b15a80e5898ee9029c65c8ba609ca19ba10719c0f0e7206a7a1e1b739339921c7268f5e9f473869d5a1f0c4d8fb82fea18a

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\hostlasco.exe.log

    Filesize

    1KB

    MD5

    39c80e11c25478a5d6863f9ec7c44834

    SHA1

    f29c08656792b274ef6da35b0071fa93e45ca940

    SHA256

    7a0cb24b4ab253688e19c863fa1d2da3c640228fa53e7aacc78b22fb7a6c4c99

    SHA512

    8095d6f3d95d783d37aee06e7d2d3b15a80e5898ee9029c65c8ba609ca19ba10719c0f0e7206a7a1e1b739339921c7268f5e9f473869d5a1f0c4d8fb82fea18a

  • C:\Users\Admin\AppData\Local\Temp\submaild\hostlasco.exe

    Filesize

    1.0MB

    MD5

    8802b4bf7ac58aacf4e9c21e90b79df7

    SHA1

    d60038c985976958202eaa6326e222e418865863

    SHA256

    b78442ab204b03b70021c64336e5b1481ef2ecda74d6d6cead0af13fc1d9b44e

    SHA512

    89fcf9ab5af4401745d858dac2476d1ebff1e2a58cd6174ad3898054d96451991786763770020d25c79094447724f7d14ecd2ebaf4e7141bf8f50fa52f7f3f67

  • C:\Users\Admin\AppData\Local\Temp\submaild\hostlasco.exe

    Filesize

    1.0MB

    MD5

    8802b4bf7ac58aacf4e9c21e90b79df7

    SHA1

    d60038c985976958202eaa6326e222e418865863

    SHA256

    b78442ab204b03b70021c64336e5b1481ef2ecda74d6d6cead0af13fc1d9b44e

    SHA512

    89fcf9ab5af4401745d858dac2476d1ebff1e2a58cd6174ad3898054d96451991786763770020d25c79094447724f7d14ecd2ebaf4e7141bf8f50fa52f7f3f67

  • C:\Users\Admin\AppData\Local\Temp\submaild\hostlasco.exe

    Filesize

    1.0MB

    MD5

    8802b4bf7ac58aacf4e9c21e90b79df7

    SHA1

    d60038c985976958202eaa6326e222e418865863

    SHA256

    b78442ab204b03b70021c64336e5b1481ef2ecda74d6d6cead0af13fc1d9b44e

    SHA512

    89fcf9ab5af4401745d858dac2476d1ebff1e2a58cd6174ad3898054d96451991786763770020d25c79094447724f7d14ecd2ebaf4e7141bf8f50fa52f7f3f67

  • C:\Users\Admin\AppData\Local\Temp\tmpAC7C.tmp.bat

    Filesize

    165B

    MD5

    dd28318bd65a010d4b4fee3d703d3a43

    SHA1

    addf4f96edc642e23a46637b28b055b05058570e

    SHA256

    edceb70a08473fbc9087354b6c3261dfa4bd2e7e50f0a0649afdb0762dabb39b

    SHA512

    c5aef54ae9273c5ef4d789208cbb6f3e782c0aa6e87df13c5345af343589cb345d2e1cf7278f6c945491c0cae61106311d240e257b208094f28937ba5b2732b1

  • memory/3512-149-0x0000000000000000-mapping.dmp

  • memory/4112-141-0x0000000000000000-mapping.dmp

  • memory/4276-142-0x0000000000000000-mapping.dmp

  • memory/4412-146-0x0000000000000000-mapping.dmp

  • memory/4472-144-0x0000000000000000-mapping.dmp

  • memory/4528-145-0x0000000000000000-mapping.dmp

  • memory/4720-135-0x00000000085E0000-0x0000000008636000-memory.dmp

    Filesize

    344KB

  • memory/4720-136-0x00000000091A0000-0x0000000009206000-memory.dmp

    Filesize

    408KB

  • memory/4720-130-0x0000000000FC0000-0x00000000010D2000-memory.dmp

    Filesize

    1.1MB

  • memory/4720-134-0x0000000008370000-0x000000000837A000-memory.dmp

    Filesize

    40KB

  • memory/4720-133-0x00000000083F0000-0x0000000008482000-memory.dmp

    Filesize

    584KB

  • memory/4720-132-0x0000000008900000-0x0000000008EA4000-memory.dmp

    Filesize

    5.6MB

  • memory/4720-131-0x00000000082B0000-0x000000000834C000-memory.dmp

    Filesize

    624KB

  • memory/4964-140-0x0000000004E53000-0x0000000004E55000-memory.dmp

    Filesize

    8KB

  • memory/4964-138-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/4964-137-0x0000000000000000-mapping.dmp