Analysis
-
max time kernel
148s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 04:20
Static task
static1
Behavioral task
behavioral1
Sample
CATALOGUE RMK TRADING LTD_PDF.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
CATALOGUE RMK TRADING LTD_PDF.exe
Resource
win10v2004-20220414-en
General
-
Target
CATALOGUE RMK TRADING LTD_PDF.exe
-
Size
856KB
-
MD5
de193c4b6e882040d19694c1b66c85e1
-
SHA1
61d4f4a219b11d083b474c3aaff59ef589e08f2f
-
SHA256
0407c714fca6ad87fb152afbf456a8e34a50ae5fff4b9fba36a1cb9fe1126e34
-
SHA512
97c413297c2cfe2a0fc63de566f7d2d3ac9531f0e5f7a2b77154d1f2aa0294f7e12331f32ee68abe55910080db68b4dea4847806faeb8bf7313331b2b2ffbb61
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\F95B724EDE\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
miraclegomez@yandex.ru - Password:
whayasaynewnew
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 32 IoCs
Processes:
resource yara_rule behavioral2/memory/2204-136-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-138-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-140-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-142-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-144-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-146-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-148-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-150-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-152-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-154-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-156-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-158-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-160-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-164-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-162-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-166-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-168-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-170-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-172-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-174-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-176-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-178-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-180-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-182-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-184-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-186-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-188-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-190-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-192-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-194-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-196-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger behavioral2/memory/2204-198-0x0000000000400000-0x00000000004B0000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
CATALOGUE RMK TRADING LTD_PDF.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation CATALOGUE RMK TRADING LTD_PDF.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 18 IoCs
Processes:
CATALOGUE RMK TRADING LTD_PDF.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CATALOGUE RMK TRADING LTD_PDF.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook CATALOGUE RMK TRADING LTD_PDF.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CATALOGUE RMK TRADING LTD_PDF.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CATALOGUE RMK TRADING LTD_PDF.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CATALOGUE RMK TRADING LTD_PDF.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CATALOGUE RMK TRADING LTD_PDF.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook CATALOGUE RMK TRADING LTD_PDF.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook CATALOGUE RMK TRADING LTD_PDF.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CATALOGUE RMK TRADING LTD_PDF.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CATALOGUE RMK TRADING LTD_PDF.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CATALOGUE RMK TRADING LTD_PDF.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CATALOGUE RMK TRADING LTD_PDF.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CATALOGUE RMK TRADING LTD_PDF.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook CATALOGUE RMK TRADING LTD_PDF.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook CATALOGUE RMK TRADING LTD_PDF.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CATALOGUE RMK TRADING LTD_PDF.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook CATALOGUE RMK TRADING LTD_PDF.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CATALOGUE RMK TRADING LTD_PDF.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 41 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
CATALOGUE RMK TRADING LTD_PDF.exedescription pid process target process PID 2900 set thread context of 2204 2900 CATALOGUE RMK TRADING LTD_PDF.exe CATALOGUE RMK TRADING LTD_PDF.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
CATALOGUE RMK TRADING LTD_PDF.exepid process 2204 CATALOGUE RMK TRADING LTD_PDF.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
CATALOGUE RMK TRADING LTD_PDF.exedescription pid process Token: SeDebugPrivilege 2204 CATALOGUE RMK TRADING LTD_PDF.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
CATALOGUE RMK TRADING LTD_PDF.exedescription pid process target process PID 2900 wrote to memory of 2204 2900 CATALOGUE RMK TRADING LTD_PDF.exe CATALOGUE RMK TRADING LTD_PDF.exe PID 2900 wrote to memory of 2204 2900 CATALOGUE RMK TRADING LTD_PDF.exe CATALOGUE RMK TRADING LTD_PDF.exe PID 2900 wrote to memory of 2204 2900 CATALOGUE RMK TRADING LTD_PDF.exe CATALOGUE RMK TRADING LTD_PDF.exe PID 2900 wrote to memory of 2204 2900 CATALOGUE RMK TRADING LTD_PDF.exe CATALOGUE RMK TRADING LTD_PDF.exe PID 2900 wrote to memory of 2204 2900 CATALOGUE RMK TRADING LTD_PDF.exe CATALOGUE RMK TRADING LTD_PDF.exe PID 2900 wrote to memory of 2204 2900 CATALOGUE RMK TRADING LTD_PDF.exe CATALOGUE RMK TRADING LTD_PDF.exe PID 2900 wrote to memory of 2204 2900 CATALOGUE RMK TRADING LTD_PDF.exe CATALOGUE RMK TRADING LTD_PDF.exe PID 2900 wrote to memory of 2204 2900 CATALOGUE RMK TRADING LTD_PDF.exe CATALOGUE RMK TRADING LTD_PDF.exe -
outlook_office_path 1 IoCs
Processes:
CATALOGUE RMK TRADING LTD_PDF.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CATALOGUE RMK TRADING LTD_PDF.exe -
outlook_win_path 1 IoCs
Processes:
CATALOGUE RMK TRADING LTD_PDF.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CATALOGUE RMK TRADING LTD_PDF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CATALOGUE RMK TRADING LTD_PDF.exe"C:\Users\Admin\AppData\Local\Temp\CATALOGUE RMK TRADING LTD_PDF.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\CATALOGUE RMK TRADING LTD_PDF.exe"{path}"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2204-162-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-192-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-646-0x0000000007010000-0x0000000007060000-memory.dmpFilesize
320KB
-
memory/2204-645-0x0000000005940000-0x00000000059A6000-memory.dmpFilesize
408KB
-
memory/2204-198-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-135-0x0000000000000000-mapping.dmp
-
memory/2204-160-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-138-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-140-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-142-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-144-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-146-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-148-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-150-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-152-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-154-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-156-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-196-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-136-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-194-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-158-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-166-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-168-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-170-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-172-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-174-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-176-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-178-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-180-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-182-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-184-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-186-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-188-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-190-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2204-164-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2900-131-0x0000000005410000-0x00000000059B4000-memory.dmpFilesize
5.6MB
-
memory/2900-130-0x0000000000460000-0x000000000053C000-memory.dmpFilesize
880KB
-
memory/2900-134-0x0000000008E50000-0x0000000008EEC000-memory.dmpFilesize
624KB
-
memory/2900-133-0x0000000002950000-0x000000000295A000-memory.dmpFilesize
40KB
-
memory/2900-132-0x0000000004E60000-0x0000000004EF2000-memory.dmpFilesize
584KB