Analysis

  • max time kernel
    86s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 12:43

General

  • Target

    SwiftBNF.scan.pdf..exe

  • Size

    732KB

  • MD5

    c30512d832ae5f5bba0b1f7a391a6e54

  • SHA1

    96c98d60726a64e7e934530def145d4e2f8e46f3

  • SHA256

    59ab0c3f8318f555ee1316fa382e9947c79e4ea03f321ebd282ed08012b8139a

  • SHA512

    c06f4bed92791bff10518c8db36aebb8f86c6ed9d3e2e141bc4fafbe92784494f4bbff6ab1edb63d4c2f682d36fb43f089ddb8a79490721781d15cbe7e9bf337

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\79FE0CC911\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.4.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.51 Location: United States OS: Microsoft Windows 7 Ultimate 64bit CPU: Intel Core Processor (Broadwell) GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/21/2022 12:50:36 PM MassLogger Started: 5/21/2022 12:50:25 PM Interval: 1 hour MassLogger Process: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes:

Signatures

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main Payload 32 IoCs
  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SwiftBNF.scan.pdf..exe
    "C:\Users\Admin\AppData\Local\Temp\SwiftBNF.scan.pdf..exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:388

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/388-84-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-61-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-88-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-579-0x0000000000895000-0x00000000008A6000-memory.dmp
    Filesize

    68KB

  • memory/388-124-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-122-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-120-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-86-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-62-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-64-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-65-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-66-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-118-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-69-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-71-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-74-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-76-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-78-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-82-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-80-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-67-0x00000000004A373E-mapping.dmp
  • memory/388-116-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-114-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-90-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-92-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-94-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-96-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-98-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-100-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-102-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-104-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-106-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-108-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-110-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/388-112-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/1100-56-0x0000000000480000-0x0000000000488000-memory.dmp
    Filesize

    32KB

  • memory/1100-55-0x0000000074B51000-0x0000000074B53000-memory.dmp
    Filesize

    8KB

  • memory/1100-54-0x00000000002F0000-0x00000000003AE000-memory.dmp
    Filesize

    760KB

  • memory/1100-60-0x0000000001FF0000-0x0000000002002000-memory.dmp
    Filesize

    72KB

  • memory/1100-59-0x00000000004D0000-0x00000000004E6000-memory.dmp
    Filesize

    88KB

  • memory/1100-58-0x00000000004C0000-0x00000000004D6000-memory.dmp
    Filesize

    88KB

  • memory/1100-57-0x00000000042C0000-0x000000000436A000-memory.dmp
    Filesize

    680KB