Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:18
Static task
static1
Behavioral task
behavioral1
Sample
167647227-54134-sdfnt4-2.pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
167647227-54134-sdfnt4-2.pdf.exe
Resource
win10v2004-20220414-en
General
-
Target
167647227-54134-sdfnt4-2.pdf.exe
-
Size
845KB
-
MD5
7dc2565dadc8f091295dfe0b87fb40d8
-
SHA1
05de206b83b43fa25e199ac07a38eae56cc97e8d
-
SHA256
c75eff508f62cf4acb9960a32a93e15f4037325a66b8b669649c83d08ee70730
-
SHA512
dd1c27d1349c55056ce1af23c0f0123aeface0188c898b0dfa9d29fb78f45280430f00b8e775f85ad1a9bcac456c244b745bb2a2522b59ddb0990ed2b571e612
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\79FE0CC911\Log.txt
masslogger
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/884-58-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Executes dropped EXE 1 IoCs
Processes:
vlc.exepid process 2012 vlc.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 316 cmd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
167647227-54134-sdfnt4-2.pdf.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 167647227-54134-sdfnt4-2.pdf.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 167647227-54134-sdfnt4-2.pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
167647227-54134-sdfnt4-2.pdf.exedescription pid process target process PID 784 set thread context of 884 784 167647227-54134-sdfnt4-2.pdf.exe InstallUtil.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 600 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
InstallUtil.exepid process 884 InstallUtil.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
167647227-54134-sdfnt4-2.pdf.exepid process 784 167647227-54134-sdfnt4-2.pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
InstallUtil.exedescription pid process Token: SeDebugPrivilege 884 InstallUtil.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
167647227-54134-sdfnt4-2.pdf.exeInstallUtil.execmd.execmd.exedescription pid process target process PID 784 wrote to memory of 884 784 167647227-54134-sdfnt4-2.pdf.exe InstallUtil.exe PID 784 wrote to memory of 884 784 167647227-54134-sdfnt4-2.pdf.exe InstallUtil.exe PID 784 wrote to memory of 884 784 167647227-54134-sdfnt4-2.pdf.exe InstallUtil.exe PID 784 wrote to memory of 884 784 167647227-54134-sdfnt4-2.pdf.exe InstallUtil.exe PID 784 wrote to memory of 884 784 167647227-54134-sdfnt4-2.pdf.exe InstallUtil.exe PID 784 wrote to memory of 884 784 167647227-54134-sdfnt4-2.pdf.exe InstallUtil.exe PID 784 wrote to memory of 884 784 167647227-54134-sdfnt4-2.pdf.exe InstallUtil.exe PID 784 wrote to memory of 884 784 167647227-54134-sdfnt4-2.pdf.exe InstallUtil.exe PID 884 wrote to memory of 1884 884 InstallUtil.exe cmd.exe PID 884 wrote to memory of 1884 884 InstallUtil.exe cmd.exe PID 884 wrote to memory of 1884 884 InstallUtil.exe cmd.exe PID 884 wrote to memory of 1884 884 InstallUtil.exe cmd.exe PID 884 wrote to memory of 316 884 InstallUtil.exe cmd.exe PID 884 wrote to memory of 316 884 InstallUtil.exe cmd.exe PID 884 wrote to memory of 316 884 InstallUtil.exe cmd.exe PID 884 wrote to memory of 316 884 InstallUtil.exe cmd.exe PID 1884 wrote to memory of 1068 1884 cmd.exe schtasks.exe PID 1884 wrote to memory of 1068 1884 cmd.exe schtasks.exe PID 1884 wrote to memory of 1068 1884 cmd.exe schtasks.exe PID 1884 wrote to memory of 1068 1884 cmd.exe schtasks.exe PID 316 wrote to memory of 600 316 cmd.exe timeout.exe PID 316 wrote to memory of 600 316 cmd.exe timeout.exe PID 316 wrote to memory of 600 316 cmd.exe timeout.exe PID 316 wrote to memory of 600 316 cmd.exe timeout.exe PID 316 wrote to memory of 2012 316 cmd.exe vlc.exe PID 316 wrote to memory of 2012 316 cmd.exe vlc.exe PID 316 wrote to memory of 2012 316 cmd.exe vlc.exe PID 316 wrote to memory of 2012 316 cmd.exe vlc.exe PID 316 wrote to memory of 2012 316 cmd.exe vlc.exe PID 316 wrote to memory of 2012 316 cmd.exe vlc.exe PID 316 wrote to memory of 2012 316 cmd.exe vlc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\167647227-54134-sdfnt4-2.pdf.exe"C:\Users\Admin\AppData\Local\Temp\167647227-54134-sdfnt4-2.pdf.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn vlc.exe /tr '"C:\Users\Admin\AppData\Roaming\VideoLAN\vlc.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn vlc.exe /tr '"C:\Users\Admin\AppData\Roaming\VideoLAN\vlc.exe"'4⤵
- Creates scheduled task(s)
PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp8344.tmp.bat""3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:600
-
-
C:\Users\Admin\AppData\Roaming\VideoLAN\vlc.exe"C:\Users\Admin\AppData\Roaming\VideoLAN\vlc.exe"4⤵
- Executes dropped EXE
PID:2012
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD55f61e8fc324d5d7c0a36087e1fdce6c6
SHA1ee39d23030a5012dc04d49e608477d602af47425
SHA256777235467a1100e22a02d5308c29d8d9eba9bec965ad81ade78310afba87bb1e
SHA512f61f5544d9b4457c1992771f8e886310322808fbfd12686c6dff913f0cda0315ed7e6bc70659c41a56d5819fc327d96c48300ce9b3c8da2d7c431734ddccf888
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e