Analysis

  • max time kernel
    105s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 02:06

General

  • Target

    BIS SWIFT_20072020_9427492749242_PDF.exe

  • Size

    859KB

  • MD5

    eaa16f260cb00d0af4d9185afe4229ad

  • SHA1

    0e24ae315d10be3bb2b6381fb8dd5236aa15bf5a

  • SHA256

    4ec1d73b11767e3b5dd254e25b0614cd4b8031db95d9677ecbbd53e0eea9c4de

  • SHA512

    aae1dce4c5ad629de0ac851fed60c0ff38e6c6c1665e0aa493c02b07832771e9ea794d492e9e6aeb60328a8975e8b8b0b9e1694ea6156966ae55ca54a0cf437e

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\AEF946DCB4\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.5.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.50 Location: United States OS: Microsoft Windows 7 Ultimate 64bit CPU: Intel Core Processor (Broadwell) GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/21/2022 5:09:16 AM MassLogger Started: 5/21/2022 5:09:05 AM Interval: 2 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\BIS SWIFT_20072020_9427492749242_PDF.exe MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes:

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    whayasaynewnew

Signatures

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main Payload 32 IoCs
  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BIS SWIFT_20072020_9427492749242_PDF.exe
    "C:\Users\Admin\AppData\Local\Temp\BIS SWIFT_20072020_9427492749242_PDF.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\BIS SWIFT_20072020_9427492749242_PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\BIS SWIFT_20072020_9427492749242_PDF.exe"
      2⤵
        PID:316
      • C:\Users\Admin\AppData\Local\Temp\BIS SWIFT_20072020_9427492749242_PDF.exe
        "C:\Users\Admin\AppData\Local\Temp\BIS SWIFT_20072020_9427492749242_PDF.exe"
        2⤵
          PID:956
        • C:\Users\Admin\AppData\Local\Temp\BIS SWIFT_20072020_9427492749242_PDF.exe
          "C:\Users\Admin\AppData\Local\Temp\BIS SWIFT_20072020_9427492749242_PDF.exe"
          2⤵
            PID:936
          • C:\Users\Admin\AppData\Local\Temp\BIS SWIFT_20072020_9427492749242_PDF.exe
            "C:\Users\Admin\AppData\Local\Temp\BIS SWIFT_20072020_9427492749242_PDF.exe"
            2⤵
              PID:1656
            • C:\Users\Admin\AppData\Local\Temp\BIS SWIFT_20072020_9427492749242_PDF.exe
              "C:\Users\Admin\AppData\Local\Temp\BIS SWIFT_20072020_9427492749242_PDF.exe"
              2⤵
              • Checks computer location settings
              • Accesses Microsoft Outlook profiles
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • outlook_office_path
              • outlook_win_path
              PID:1360

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1360-86-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-62-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-580-0x0000000001F60000-0x0000000001F74000-memory.dmp

            Filesize

            80KB

          • memory/1360-579-0x0000000004CA5000-0x0000000004CB6000-memory.dmp

            Filesize

            68KB

          • memory/1360-58-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-90-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-61-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-88-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-63-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-64-0x00000000004AB84E-mapping.dmp

          • memory/1360-66-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-68-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-70-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-72-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-74-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-76-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-78-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-80-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-82-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-84-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-577-0x00000000005D0000-0x0000000000614000-memory.dmp

            Filesize

            272KB

          • memory/1360-120-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-59-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-92-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-94-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-96-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-98-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-100-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-102-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-104-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-106-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-108-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-110-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-112-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-114-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-116-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1360-118-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/1944-55-0x0000000075EF1000-0x0000000075EF3000-memory.dmp

            Filesize

            8KB

          • memory/1944-57-0x0000000007D80000-0x0000000007E38000-memory.dmp

            Filesize

            736KB

          • memory/1944-54-0x0000000000020000-0x00000000000FE000-memory.dmp

            Filesize

            888KB

          • memory/1944-56-0x0000000000360000-0x0000000000372000-memory.dmp

            Filesize

            72KB