Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 01:58

General

  • Target

    PI 200000679 Rev 3_pdf.exe

  • Size

    1.1MB

  • MD5

    87084086939792c1a2ccbb561c4fd598

  • SHA1

    3f52ccd6b2ab2618ce47e83bdc858cebea390544

  • SHA256

    a2a4fc12990dcf4a9778f96840b49be84f9563edd2b5209b6dac1ffb2ed8e38d

  • SHA512

    1a8b214bdfa2d9ef2243b3ab874947625b7074f09a3a2c0d8e6ba33697f8723c9ce145756600b1fd2c3119b0deda311f42ab7de64034f8d445a6ac44a472048d

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\F95B724EDE\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.2.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.50 Location: United States OS: Microsoft Windows 10 Pro64bit CPU: Intel Core Processor (Broadwell) GPU: Microsoft Basic Display Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/21/2022 5:02:04 AM MassLogger Started: 5/21/2022 5:01:48 AM Interval: 6 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\PI 200000679 Rev 3_pdf.exe As Administrator: True

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    evra12345

Signatures

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main Payload 32 IoCs
  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 18 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PI 200000679 Rev 3_pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\PI 200000679 Rev 3_pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Users\Admin\AppData\Local\Temp\PI 200000679 Rev 3_pdf.exe
      "{path}"
      2⤵
        PID:1512
      • C:\Users\Admin\AppData\Local\Temp\PI 200000679 Rev 3_pdf.exe
        "{path}"
        2⤵
        • Checks computer location settings
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • outlook_office_path
        • outlook_win_path
        PID:4388

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PI 200000679 Rev 3_pdf.exe.log

      Filesize

      1KB

      MD5

      400f1cc1a0a0ce1cdabda365ab3368ce

      SHA1

      1ecf683f14271d84f3b6063493dce00ff5f42075

      SHA256

      c8fa64f4b69df13ed6408fd4a204f318a36c2f38c85d4a4d42adfc9173f73765

      SHA512

      14c8cfd58d097e5e89c8cabe1e665173f1ccf604a9ef70cdcb84116e265f90819c19c891be408e0ad7e29086a5c2ea2883b7a7d1184878dbbac63e2cabcd1c45

    • memory/1512-135-0x0000000000000000-mapping.dmp

    • memory/4224-131-0x0000000007F30000-0x00000000084D4000-memory.dmp

      Filesize

      5.6MB

    • memory/4224-132-0x0000000007B60000-0x0000000007BF2000-memory.dmp

      Filesize

      584KB

    • memory/4224-133-0x0000000007B40000-0x0000000007B4A000-memory.dmp

      Filesize

      40KB

    • memory/4224-134-0x000000000BB00000-0x000000000BB9C000-memory.dmp

      Filesize

      624KB

    • memory/4224-130-0x0000000000720000-0x0000000000838000-memory.dmp

      Filesize

      1.1MB

    • memory/4388-162-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-170-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-140-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-142-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-144-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-146-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-148-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-150-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-152-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-154-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-156-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-158-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-160-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-136-0x0000000000000000-mapping.dmp

    • memory/4388-164-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-166-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-168-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-137-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-172-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-174-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-176-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-178-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-180-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-182-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-184-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-186-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-188-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-190-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-192-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-194-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-196-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-198-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-200-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/4388-639-0x00000000063C0000-0x0000000006426000-memory.dmp

      Filesize

      408KB

    • memory/4388-640-0x00000000080A0000-0x00000000080F0000-memory.dmp

      Filesize

      320KB