Analysis
-
max time kernel
143s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 11:23
Static task
static1
Behavioral task
behavioral1
Sample
HDFCR52020061784196958 PDF.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
HDFCR52020061784196958 PDF.exe
Resource
win10v2004-20220414-en
General
-
Target
HDFCR52020061784196958 PDF.exe
-
Size
852KB
-
MD5
ccc19de53da5589da2a83995e22c649b
-
SHA1
b44010fa8d9ac9e57bdca725d1497288bcd1bb72
-
SHA256
00d6fd04656c60eb2712da13fd06488de59c25e79c18b2a8ae2b2ed12c4e030f
-
SHA512
344c5a6a99e506574c361adc6e6d7f040688d55d2323a8df2acc17a74d682686e46f73fee386f1886d53461197db6be6eba32460455d3a9efab8e47185d52790
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\F95B724EDE\Log.txt
masslogger
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 1 IoCs
resource yara_rule behavioral2/memory/2980-136-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation HDFCR52020061784196958 PDF.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 18 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HDFCR52020061784196958 PDF.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HDFCR52020061784196958 PDF.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HDFCR52020061784196958 PDF.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook HDFCR52020061784196958 PDF.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HDFCR52020061784196958 PDF.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HDFCR52020061784196958 PDF.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook HDFCR52020061784196958 PDF.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HDFCR52020061784196958 PDF.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook HDFCR52020061784196958 PDF.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook HDFCR52020061784196958 PDF.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HDFCR52020061784196958 PDF.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HDFCR52020061784196958 PDF.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HDFCR52020061784196958 PDF.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HDFCR52020061784196958 PDF.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook HDFCR52020061784196958 PDF.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HDFCR52020061784196958 PDF.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HDFCR52020061784196958 PDF.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook HDFCR52020061784196958 PDF.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3448 set thread context of 2980 3448 HDFCR52020061784196958 PDF.exe 78 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2980 HDFCR52020061784196958 PDF.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3448 HDFCR52020061784196958 PDF.exe 3448 HDFCR52020061784196958 PDF.exe 2980 HDFCR52020061784196958 PDF.exe 2980 HDFCR52020061784196958 PDF.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3448 HDFCR52020061784196958 PDF.exe Token: SeDebugPrivilege 2980 HDFCR52020061784196958 PDF.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2980 HDFCR52020061784196958 PDF.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3448 wrote to memory of 2876 3448 HDFCR52020061784196958 PDF.exe 77 PID 3448 wrote to memory of 2876 3448 HDFCR52020061784196958 PDF.exe 77 PID 3448 wrote to memory of 2876 3448 HDFCR52020061784196958 PDF.exe 77 PID 3448 wrote to memory of 2980 3448 HDFCR52020061784196958 PDF.exe 78 PID 3448 wrote to memory of 2980 3448 HDFCR52020061784196958 PDF.exe 78 PID 3448 wrote to memory of 2980 3448 HDFCR52020061784196958 PDF.exe 78 PID 3448 wrote to memory of 2980 3448 HDFCR52020061784196958 PDF.exe 78 PID 3448 wrote to memory of 2980 3448 HDFCR52020061784196958 PDF.exe 78 PID 3448 wrote to memory of 2980 3448 HDFCR52020061784196958 PDF.exe 78 PID 3448 wrote to memory of 2980 3448 HDFCR52020061784196958 PDF.exe 78 PID 3448 wrote to memory of 2980 3448 HDFCR52020061784196958 PDF.exe 78 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HDFCR52020061784196958 PDF.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HDFCR52020061784196958 PDF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HDFCR52020061784196958 PDF.exe"C:\Users\Admin\AppData\Local\Temp\HDFCR52020061784196958 PDF.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\HDFCR52020061784196958 PDF.exe"{path}"2⤵PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\HDFCR52020061784196958 PDF.exe"{path}"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2980
-