Analysis

  • max time kernel
    160s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    11-05-2022 02:29

General

  • Target

    b134fc241ecd93ac658ded7bdad5eaf5f600f255e3fc05c383c23aad8b045592.exe

  • Size

    824KB

  • MD5

    5faca701184189e435ec2048d8a2044d

  • SHA1

    5447fdb7ffb7a099a2f027c74a53cc137fc3c44d

  • SHA256

    b134fc241ecd93ac658ded7bdad5eaf5f600f255e3fc05c383c23aad8b045592

  • SHA512

    49fff6399a1a8a1ba2ad93a863d41f9f1fa9650373be009e3bdfc6bd47849ffc9d279c3afd03da4f0cc846261b558deada472eaa9ca42d1c6c4c7e25610a5cce

Malware Config

Signatures

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main Payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b134fc241ecd93ac658ded7bdad5eaf5f600f255e3fc05c383c23aad8b045592.exe
    "C:\Users\Admin\AppData\Local\Temp\b134fc241ecd93ac658ded7bdad5eaf5f600f255e3fc05c383c23aad8b045592.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4744
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bBEKkPV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2AC4.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:4072
    • C:\Users\Admin\AppData\Local\Temp\b134fc241ecd93ac658ded7bdad5eaf5f600f255e3fc05c383c23aad8b045592.exe
      "{path}"
      2⤵
        PID:2312
      • C:\Users\Admin\AppData\Local\Temp\b134fc241ecd93ac658ded7bdad5eaf5f600f255e3fc05c383c23aad8b045592.exe
        "{path}"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3756
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell" Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\b134fc241ecd93ac658ded7bdad5eaf5f600f255e3fc05c383c23aad8b045592.exe'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1356

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\b134fc241ecd93ac658ded7bdad5eaf5f600f255e3fc05c383c23aad8b045592.exe.log

      Filesize

      1KB

      MD5

      8ec831f3e3a3f77e4a7b9cd32b48384c

      SHA1

      d83f09fd87c5bd86e045873c231c14836e76a05c

      SHA256

      7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

      SHA512

      26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

    • C:\Users\Admin\AppData\Local\Temp\tmp2AC4.tmp

      Filesize

      1KB

      MD5

      e4fcd68dc7c9138110abbe0e485a67a1

      SHA1

      13818ef7c4805fe022cc53d0ea8e21d57134f8ae

      SHA256

      7bd00261a7897bb20085c5bf6aa791ea5ac98cbd952e7935c5a51baff01b3f8f

      SHA512

      45982da2f8b427cbc2293965518cfac6f39de917b4978ba5077eba694d1017c3f9c3b3ba4f737e2e3025f24f5e933de6e3402cbc212edfccc0d5c61dec8e0be0

    • memory/1356-149-0x00000000065E0000-0x00000000065FA000-memory.dmp

      Filesize

      104KB

    • memory/1356-143-0x0000000004AB0000-0x0000000004AE6000-memory.dmp

      Filesize

      216KB

    • memory/1356-148-0x00000000076F0000-0x0000000007D6A000-memory.dmp

      Filesize

      6.5MB

    • memory/1356-147-0x0000000004DD0000-0x0000000004DEE000-memory.dmp

      Filesize

      120KB

    • memory/1356-150-0x0000000007120000-0x00000000071B6000-memory.dmp

      Filesize

      600KB

    • memory/1356-146-0x00000000051C0000-0x0000000005226000-memory.dmp

      Filesize

      408KB

    • memory/1356-145-0x00000000050A0000-0x00000000050C2000-memory.dmp

      Filesize

      136KB

    • memory/1356-144-0x0000000005270000-0x0000000005898000-memory.dmp

      Filesize

      6.2MB

    • memory/1356-141-0x0000000000000000-mapping.dmp

    • memory/1356-151-0x0000000006650000-0x0000000006672000-memory.dmp

      Filesize

      136KB

    • memory/2312-137-0x0000000000000000-mapping.dmp

    • memory/3756-140-0x0000000005C80000-0x0000000005CE6000-memory.dmp

      Filesize

      408KB

    • memory/3756-139-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/3756-138-0x0000000000000000-mapping.dmp

    • memory/4072-135-0x0000000000000000-mapping.dmp

    • memory/4744-130-0x00000000009B0000-0x0000000000A84000-memory.dmp

      Filesize

      848KB

    • memory/4744-134-0x0000000008C00000-0x0000000008C9C000-memory.dmp

      Filesize

      624KB

    • memory/4744-133-0x0000000005430000-0x000000000543A000-memory.dmp

      Filesize

      40KB

    • memory/4744-132-0x0000000005470000-0x0000000005502000-memory.dmp

      Filesize

      584KB

    • memory/4744-131-0x0000000005AE0000-0x0000000006084000-memory.dmp

      Filesize

      5.6MB