Analysis

  • max time kernel
    89s
  • max time network
    178s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    11-05-2022 14:09

General

  • Target

    0bc5aa9d627b2c240996e8592523b47dccff48641c236c5f345a9f3bb337f09f.exe

  • Size

    822KB

  • MD5

    a3c514f0e2c41c8dd50b72b12d16a84b

  • SHA1

    b46eba2943e309aade28de380e3c363d0d90b3c1

  • SHA256

    0bc5aa9d627b2c240996e8592523b47dccff48641c236c5f345a9f3bb337f09f

  • SHA512

    af208b1578d3163f77c60a366dfbd11390f8a06253114c861437503ed2349751292c4dd657d429a3662afe37da9dd634b43eae9f4187e559e40d399ac76307e4

Malware Config

Signatures

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main Payload 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bc5aa9d627b2c240996e8592523b47dccff48641c236c5f345a9f3bb337f09f.exe
    "C:\Users\Admin\AppData\Local\Temp\0bc5aa9d627b2c240996e8592523b47dccff48641c236c5f345a9f3bb337f09f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KfoToAjet" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6FF3.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1676
    • C:\Users\Admin\AppData\Local\Temp\0bc5aa9d627b2c240996e8592523b47dccff48641c236c5f345a9f3bb337f09f.exe
      "{path}"
      2⤵
      • Checks computer location settings
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • outlook_office_path
      • outlook_win_path
      PID:1560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp6FF3.tmp

    Filesize

    1KB

    MD5

    37b0a81114710e415f3656783319b38e

    SHA1

    c62aea3636ad95bfc2116879f2306b6f8132e3f0

    SHA256

    8b70bd75fad031d3f5db432a175a4eade4fa8ef562c6559916e1b36637d6f28e

    SHA512

    92ae1e2f8ffbbe00131311679f485113be03bb0f9b445d09b6e1b53de625c28391ab26e63300500b71148a323d1630164ebdd510d5b3e65f183c33c96f331286

  • memory/1560-67-0x000000000048175E-mapping.dmp

  • memory/1560-66-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1560-73-0x0000000000C95000-0x0000000000CA6000-memory.dmp

    Filesize

    68KB

  • memory/1560-71-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1560-69-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1560-62-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1560-65-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1560-64-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1560-61-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/1676-59-0x0000000000000000-mapping.dmp

  • memory/2016-56-0x0000000000C50000-0x0000000000CE4000-memory.dmp

    Filesize

    592KB

  • memory/2016-55-0x0000000000270000-0x0000000000282000-memory.dmp

    Filesize

    72KB

  • memory/2016-54-0x0000000001080000-0x0000000001154000-memory.dmp

    Filesize

    848KB

  • memory/2016-58-0x00000000759F1000-0x00000000759F3000-memory.dmp

    Filesize

    8KB

  • memory/2016-57-0x0000000005250000-0x00000000052E8000-memory.dmp

    Filesize

    608KB