Analysis

  • max time kernel
    91s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 13:29

General

  • Target

    ec2433fe91061cb731a1828ed41897b005983b5b5092ffe561e76b217c12cef8.ps1

  • Size

    1.8MB

  • MD5

    b06efcabab1322f5f615261587b81504

  • SHA1

    2c5925b3662cf5f05e6ae9ee61912ee0ffa7adf9

  • SHA256

    ec2433fe91061cb731a1828ed41897b005983b5b5092ffe561e76b217c12cef8

  • SHA512

    90c0820868832f6010e4bff1a2b88780435a987b86e911cb6d33863b52c9798c58b9cebf838ddec706ccab687fe3560e3bfcb1d81ae2643930193db9869ee67c

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\EEB932C954\Log.txt

Family

masslogger

Ransom Note
<|| v2.4.0.0 ||> User Name: Admin IP: 154.61.71.13 Location: United States Windows OS: Microsoft Windows 10 Pro 64bit Windows Serial Key: W269N-WFGWX-YVC9B-4J6C9-T83GX CPU: Intel Core Processor (Broadwell) GPU: Microsoft Basic Display Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/20/2022 3:57:58 PM MassLogger Started: 5/20/2022 3:57:52 PM Interval: 96 hour MassLogger Process: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MassLogger Melt: true MassLogger Exit after delivery: false As Administrator: True Processes: Name:conhost, Title:Administrator: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <|| WD Exclusion ||> Disabled <|| Binder ||> Disabled <|| Downloader ||> Disabled <|| Bot Killer ||> Disabled <|| Window Searcher ||> Disabled <|| Search And Upload ||> Disabled <|| Telegram Desktop ||> Not Installed <|| Pidgin ||> Not Installed <|| FileZilla ||> Not Installed <|| Discord Tokken ||> Not Installed <|| NordVPN ||> Not Installed <|| Outlook ||> Not Installed <|| FoxMail ||> Not Installed <|| Thunderbird ||> Not Installed <|| FireFox ||> Not Found <|| QQ Browser ||> Not Installed <|| Chromium Recovery ||> Not Installed or Not Found <|| Keylogger And Clipboard ||> Disabled

Signatures

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main Payload 2 IoCs
  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ec2433fe91061cb731a1828ed41897b005983b5b5092ffe561e76b217c12cef8.ps1
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3112
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:4408
      • C:\Windows\SysWOW64\cmd.exe
        "cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3624
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3104

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    93cb4762051c76ef612cb1d1d3d2239b

    SHA1

    422e15da3533916c8c202f10419ae256d3294b98

    SHA256

    2a71d735c4783ea63445e7a9edbed8d284dd0127a97419e7274aac2c14bfe6c1

    SHA512

    dd125954450fcd5eb4804852478b8d2356c60ad03441996aff0163b293fe5f40d3cf5c3130690896c0cf12d7f48c3d36a0bbed5a996413d4672a706a83852b34

  • memory/3104-147-0x0000000006130000-0x000000000614E000-memory.dmp

    Filesize

    120KB

  • memory/3104-151-0x0000000006690000-0x00000000066B2000-memory.dmp

    Filesize

    136KB

  • memory/3104-150-0x0000000007120000-0x00000000071B6000-memory.dmp

    Filesize

    600KB

  • memory/3104-149-0x00000000064A0000-0x00000000064BA000-memory.dmp

    Filesize

    104KB

  • memory/3104-148-0x00000000077A0000-0x0000000007E1A000-memory.dmp

    Filesize

    6.5MB

  • memory/3104-143-0x0000000005220000-0x0000000005848000-memory.dmp

    Filesize

    6.2MB

  • memory/3104-145-0x0000000005850000-0x00000000058B6000-memory.dmp

    Filesize

    408KB

  • memory/3104-144-0x0000000005160000-0x0000000005182000-memory.dmp

    Filesize

    136KB

  • memory/3104-141-0x0000000000000000-mapping.dmp

  • memory/3104-142-0x0000000002710000-0x0000000002746000-memory.dmp

    Filesize

    216KB

  • memory/3112-131-0x00007FFB62E30000-0x00007FFB638F1000-memory.dmp

    Filesize

    10.8MB

  • memory/3112-130-0x000001A4EF650000-0x000001A4EF672000-memory.dmp

    Filesize

    136KB

  • memory/3624-140-0x0000000000000000-mapping.dmp

  • memory/4408-139-0x0000000006960000-0x00000000069B0000-memory.dmp

    Filesize

    320KB

  • memory/4408-138-0x0000000006840000-0x000000000684A000-memory.dmp

    Filesize

    40KB

  • memory/4408-137-0x00000000053C0000-0x0000000005452000-memory.dmp

    Filesize

    584KB

  • memory/4408-136-0x00000000050B0000-0x0000000005116000-memory.dmp

    Filesize

    408KB

  • memory/4408-135-0x0000000004EE0000-0x0000000004F7C000-memory.dmp

    Filesize

    624KB

  • memory/4408-134-0x0000000005570000-0x0000000005B14000-memory.dmp

    Filesize

    5.6MB

  • memory/4408-133-0x00000000004B2B8E-mapping.dmp

  • memory/4408-132-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB