Analysis

  • max time kernel
    89s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 11:52

General

  • Target

    ttttttt.exe

  • Size

    1.3MB

  • MD5

    5871c56853982658b13619b6beae47da

  • SHA1

    f2dbb57a824853f48a6b16797e9682b328078b93

  • SHA256

    296b2d6c24dd68f7a59ea4388d979bba6572c288ab891cd35ec81e56c602318d

  • SHA512

    5cc16a8c7a76320927f3818845929fe42583a0f6151144e81d2a6afb0d86a6ea3c65efaa6efd54f6b5f40dd5f1d33bf0638089516d75c2819cb8ae4c7606edd1

Malware Config

Signatures

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main Payload 2 IoCs
  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ttttttt.exe
    "C:\Users\Admin\AppData\Local\Temp\ttttttt.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\SysWOW64\notepad.exe
      "C:\Windows\system32\notepad.exe"
      2⤵
      • Drops startup file
      PID:4400
    • C:\Users\Admin\AppData\Local\Temp\ttttttt.exe
      "C:\Users\Admin\AppData\Local\Temp\ttttttt.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4240
      • C:\Windows\SysWOW64\cmd.exe
        "cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\ttttttt.exe' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:176
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\ttttttt.exe'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4436
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
    1⤵
      PID:4600

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/176-139-0x0000000000000000-mapping.dmp
    • memory/2192-130-0x0000000002450000-0x000000000245A000-memory.dmp
      Filesize

      40KB

    • memory/4240-132-0x0000000000000000-mapping.dmp
    • memory/4240-134-0x0000000000BC0000-0x0000000000C68000-memory.dmp
      Filesize

      672KB

    • memory/4240-133-0x0000000000BC0000-0x0000000000C68000-memory.dmp
      Filesize

      672KB

    • memory/4240-135-0x0000000004E20000-0x00000000053C4000-memory.dmp
      Filesize

      5.6MB

    • memory/4240-136-0x0000000004CF0000-0x0000000004D8C000-memory.dmp
      Filesize

      624KB

    • memory/4240-137-0x00000000054E0000-0x0000000005546000-memory.dmp
      Filesize

      408KB

    • memory/4240-138-0x0000000005560000-0x00000000055F2000-memory.dmp
      Filesize

      584KB

    • memory/4400-131-0x0000000000000000-mapping.dmp
    • memory/4436-140-0x0000000000000000-mapping.dmp
    • memory/4436-141-0x0000000002370000-0x00000000023A6000-memory.dmp
      Filesize

      216KB

    • memory/4436-142-0x0000000004F60000-0x0000000005588000-memory.dmp
      Filesize

      6.2MB

    • memory/4436-143-0x0000000004CB0000-0x0000000004CD2000-memory.dmp
      Filesize

      136KB

    • memory/4436-144-0x0000000004DD0000-0x0000000004E36000-memory.dmp
      Filesize

      408KB

    • memory/4436-145-0x0000000005C60000-0x0000000005C7E000-memory.dmp
      Filesize

      120KB

    • memory/4436-146-0x0000000007500000-0x0000000007B7A000-memory.dmp
      Filesize

      6.5MB

    • memory/4436-147-0x0000000006130000-0x000000000614A000-memory.dmp
      Filesize

      104KB

    • memory/4436-148-0x0000000006F20000-0x0000000006FB6000-memory.dmp
      Filesize

      600KB

    • memory/4436-149-0x0000000006210000-0x0000000006232000-memory.dmp
      Filesize

      136KB