Analysis

  • max time kernel
    126s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 00:35

General

  • Target

    21-7 air ??? AWB ??? ????.pdf.exe

  • Size

    950KB

  • MD5

    beb1f7f7ae08c302d5df6aece0ca2146

  • SHA1

    a088d4600b3c9573c92968e412c973a2981708d6

  • SHA256

    10eead56b5d7413b12b1fd1a4bf63dba2fa8995dad47d9a29577efd98264247a

  • SHA512

    0313b31697d435b8f8a0ae8d17cac7026a39532ce06b9cbb20caa8b4a6f23bfe05646449bacb29b4276276ec3893a9c3e1d6c1594c74ea0319ed31ef74dcf486

Malware Config

Signatures

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main Payload 32 IoCs
  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21-7 air ___ AWB ___ ____.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\21-7 air ___ AWB ___ ____.pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Users\Admin\AppData\Local\Temp\21-7 air ___ AWB ___ ____.pdf.exe
      "{path}"
      2⤵
      • Checks computer location settings
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • outlook_office_path
      • outlook_win_path
      PID:1500

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/780-54-0x0000000000A20000-0x0000000000B14000-memory.dmp

    Filesize

    976KB

  • memory/780-55-0x0000000074E91000-0x0000000074E93000-memory.dmp

    Filesize

    8KB

  • memory/780-56-0x0000000000210000-0x000000000021A000-memory.dmp

    Filesize

    40KB

  • memory/780-57-0x0000000005030000-0x00000000050DE000-memory.dmp

    Filesize

    696KB

  • memory/1500-58-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-59-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-61-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-62-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-63-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-64-0x00000000004A157E-mapping.dmp

  • memory/1500-66-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-68-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-70-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-72-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-74-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-76-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-78-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-80-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-82-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-84-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-86-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-88-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-90-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-92-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-94-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-96-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-98-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-100-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-102-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-104-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-106-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-108-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-110-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-112-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-114-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-116-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-118-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-120-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/1500-570-0x00000000046C0000-0x0000000004704000-memory.dmp

    Filesize

    272KB