Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21/05/2022, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
SwiftSDM.scan.pdf..exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SwiftSDM.scan.pdf..exe
Resource
win10v2004-20220414-en
General
-
Target
SwiftSDM.scan.pdf..exe
-
Size
745KB
-
MD5
b881533b7b297c09802c0b74adbd2936
-
SHA1
23e8bcb9a029df6f8ee460eec6ac600459d6eed3
-
SHA256
0ceca38c78e5862c0d87d4c0dfacfb25fef8310e502415721c35331f1315cc04
-
SHA512
caa530f0fff257b66b2ae107a8ffdd2df910a24c640559965491e2281a99949aae0761a537ee7bd349b4154f03f27d991435270b09cdb97df0d02e29e8ac4497
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\3B8E3C2477\Log.txt
masslogger
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 32 IoCs
resource yara_rule behavioral1/memory/1700-64-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-65-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-66-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-67-0x00000000004A373E-mapping.dmp family_masslogger behavioral1/memory/1700-69-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-71-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-74-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-76-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-78-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-80-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-82-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-84-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-86-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-88-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-90-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-92-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-94-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-96-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-98-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-100-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-102-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-104-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-108-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-106-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-110-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-112-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-114-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-116-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-118-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-120-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-122-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/1700-124-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\chrome = "\"C:\\Users\\Admin\\chrome.exe\"" SwiftSDM.scan.pdf..exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1092 set thread context of 1700 1092 SwiftSDM.scan.pdf..exe 30 -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1092 SwiftSDM.scan.pdf..exe 1092 SwiftSDM.scan.pdf..exe 1092 SwiftSDM.scan.pdf..exe 1092 SwiftSDM.scan.pdf..exe 1092 SwiftSDM.scan.pdf..exe 1092 SwiftSDM.scan.pdf..exe 1092 SwiftSDM.scan.pdf..exe 1092 SwiftSDM.scan.pdf..exe 1092 SwiftSDM.scan.pdf..exe 1092 SwiftSDM.scan.pdf..exe 1092 SwiftSDM.scan.pdf..exe 1092 SwiftSDM.scan.pdf..exe 1092 SwiftSDM.scan.pdf..exe 1092 SwiftSDM.scan.pdf..exe 1092 SwiftSDM.scan.pdf..exe 1700 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1092 SwiftSDM.scan.pdf..exe Token: SeDebugPrivilege 1700 RegAsm.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1092 wrote to memory of 1352 1092 SwiftSDM.scan.pdf..exe 29 PID 1092 wrote to memory of 1352 1092 SwiftSDM.scan.pdf..exe 29 PID 1092 wrote to memory of 1352 1092 SwiftSDM.scan.pdf..exe 29 PID 1092 wrote to memory of 1352 1092 SwiftSDM.scan.pdf..exe 29 PID 1092 wrote to memory of 1352 1092 SwiftSDM.scan.pdf..exe 29 PID 1092 wrote to memory of 1352 1092 SwiftSDM.scan.pdf..exe 29 PID 1092 wrote to memory of 1352 1092 SwiftSDM.scan.pdf..exe 29 PID 1092 wrote to memory of 1700 1092 SwiftSDM.scan.pdf..exe 30 PID 1092 wrote to memory of 1700 1092 SwiftSDM.scan.pdf..exe 30 PID 1092 wrote to memory of 1700 1092 SwiftSDM.scan.pdf..exe 30 PID 1092 wrote to memory of 1700 1092 SwiftSDM.scan.pdf..exe 30 PID 1092 wrote to memory of 1700 1092 SwiftSDM.scan.pdf..exe 30 PID 1092 wrote to memory of 1700 1092 SwiftSDM.scan.pdf..exe 30 PID 1092 wrote to memory of 1700 1092 SwiftSDM.scan.pdf..exe 30 PID 1092 wrote to memory of 1700 1092 SwiftSDM.scan.pdf..exe 30 PID 1092 wrote to memory of 1700 1092 SwiftSDM.scan.pdf..exe 30 PID 1092 wrote to memory of 1700 1092 SwiftSDM.scan.pdf..exe 30 PID 1092 wrote to memory of 1700 1092 SwiftSDM.scan.pdf..exe 30 PID 1092 wrote to memory of 1700 1092 SwiftSDM.scan.pdf..exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\SwiftSDM.scan.pdf..exe"C:\Users\Admin\AppData\Local\Temp\SwiftSDM.scan.pdf..exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1352
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-