Analysis
-
max time kernel
131s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 23:52
Static task
static1
Behavioral task
behavioral1
Sample
AUG10TH_.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
AUG10TH_.exe
Resource
win10v2004-20220414-en
General
-
Target
AUG10TH_.exe
-
Size
1.1MB
-
MD5
9d1676055eebd75eb7abd7a09528776f
-
SHA1
da284df615ccefcf583175ec88ea887fc1d769b2
-
SHA256
b045f558a43c37201a204a240bd09b7da12735958ad5c8d317feff0044d132c4
-
SHA512
74197863ee985f7e974d794f3038dfe8bb4e1973107e424a06ed801c63b32a4e1fd2dd9be172343b8040bb663eaf5cb04a1b6659fa36b734d07a2e30547fb8fc
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2876-136-0x0000000000400000-0x00000000004C4000-memory.dmp family_masslogger -
Executes dropped EXE 1 IoCs
Processes:
vlc.exepid process 1460 vlc.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
AUG10TH_.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation AUG10TH_.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 32 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
AUG10TH_.exedescription pid process target process PID 3420 set thread context of 2876 3420 AUG10TH_.exe AUG10TH_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3232 timeout.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
AUG10TH_.exeAUG10TH_.exevlc.exepid process 3420 AUG10TH_.exe 3420 AUG10TH_.exe 3420 AUG10TH_.exe 3420 AUG10TH_.exe 3420 AUG10TH_.exe 3420 AUG10TH_.exe 3420 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 2876 AUG10TH_.exe 1460 vlc.exe 1460 vlc.exe 1460 vlc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
AUG10TH_.exeAUG10TH_.exevlc.exedescription pid process Token: SeDebugPrivilege 3420 AUG10TH_.exe Token: SeDebugPrivilege 2876 AUG10TH_.exe Token: SeDebugPrivilege 1460 vlc.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
AUG10TH_.exeAUG10TH_.execmd.execmd.exedescription pid process target process PID 3420 wrote to memory of 2876 3420 AUG10TH_.exe AUG10TH_.exe PID 3420 wrote to memory of 2876 3420 AUG10TH_.exe AUG10TH_.exe PID 3420 wrote to memory of 2876 3420 AUG10TH_.exe AUG10TH_.exe PID 3420 wrote to memory of 2876 3420 AUG10TH_.exe AUG10TH_.exe PID 3420 wrote to memory of 2876 3420 AUG10TH_.exe AUG10TH_.exe PID 3420 wrote to memory of 2876 3420 AUG10TH_.exe AUG10TH_.exe PID 3420 wrote to memory of 2876 3420 AUG10TH_.exe AUG10TH_.exe PID 3420 wrote to memory of 2876 3420 AUG10TH_.exe AUG10TH_.exe PID 2876 wrote to memory of 2776 2876 AUG10TH_.exe cmd.exe PID 2876 wrote to memory of 2776 2876 AUG10TH_.exe cmd.exe PID 2876 wrote to memory of 2776 2876 AUG10TH_.exe cmd.exe PID 2876 wrote to memory of 3744 2876 AUG10TH_.exe cmd.exe PID 2876 wrote to memory of 3744 2876 AUG10TH_.exe cmd.exe PID 2876 wrote to memory of 3744 2876 AUG10TH_.exe cmd.exe PID 2776 wrote to memory of 4600 2776 cmd.exe schtasks.exe PID 2776 wrote to memory of 4600 2776 cmd.exe schtasks.exe PID 2776 wrote to memory of 4600 2776 cmd.exe schtasks.exe PID 3744 wrote to memory of 3232 3744 cmd.exe timeout.exe PID 3744 wrote to memory of 3232 3744 cmd.exe timeout.exe PID 3744 wrote to memory of 3232 3744 cmd.exe timeout.exe PID 3744 wrote to memory of 1460 3744 cmd.exe vlc.exe PID 3744 wrote to memory of 1460 3744 cmd.exe vlc.exe PID 3744 wrote to memory of 1460 3744 cmd.exe vlc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AUG10TH_.exe"C:\Users\Admin\AppData\Local\Temp\AUG10TH_.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\AUG10TH_.exe"{path}"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn vlc.exe /tr '"C:\Users\Admin\VideoLAN\vlc.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn vlc.exe /tr '"C:\Users\Admin\VideoLAN\vlc.exe"'4⤵
- Creates scheduled task(s)
PID:4600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpEFFD.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:3232
-
-
C:\Users\Admin\VideoLAN\vlc.exe"C:\Users\Admin\VideoLAN\vlc.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5400f1cc1a0a0ce1cdabda365ab3368ce
SHA11ecf683f14271d84f3b6063493dce00ff5f42075
SHA256c8fa64f4b69df13ed6408fd4a204f318a36c2f38c85d4a4d42adfc9173f73765
SHA51214c8cfd58d097e5e89c8cabe1e665173f1ccf604a9ef70cdcb84116e265f90819c19c891be408e0ad7e29086a5c2ea2883b7a7d1184878dbbac63e2cabcd1c45
-
Filesize
140B
MD5f70f5da3d2b5978d5567881265efe045
SHA1d8680f7f8a9f4d1264c9290a917a8b75846a63a0
SHA256718c49ac5e7d45a04777194d58361e19710c9f6bb4e2ee0fde573b23e098015f
SHA5129afde5aefa6c1555c56631a433467840b3dac52d9940b6589a71a1fd9aa8f8e65f79cfcf29c3a966097b0f89dd206aa46d144f5efa0f43a6eb05b9143e4c26f8
-
Filesize
1.1MB
MD59d1676055eebd75eb7abd7a09528776f
SHA1da284df615ccefcf583175ec88ea887fc1d769b2
SHA256b045f558a43c37201a204a240bd09b7da12735958ad5c8d317feff0044d132c4
SHA51274197863ee985f7e974d794f3038dfe8bb4e1973107e424a06ed801c63b32a4e1fd2dd9be172343b8040bb663eaf5cb04a1b6659fa36b734d07a2e30547fb8fc
-
Filesize
1.1MB
MD59d1676055eebd75eb7abd7a09528776f
SHA1da284df615ccefcf583175ec88ea887fc1d769b2
SHA256b045f558a43c37201a204a240bd09b7da12735958ad5c8d317feff0044d132c4
SHA51274197863ee985f7e974d794f3038dfe8bb4e1973107e424a06ed801c63b32a4e1fd2dd9be172343b8040bb663eaf5cb04a1b6659fa36b734d07a2e30547fb8fc