Analysis
-
max time kernel
116s -
max time network
154s -
platform
windows7_x64 -
resource
win7 -
submitted
08-07-2020 16:52
Static task
static1
Behavioral task
behavioral1
Sample
Oustanding payment.exe
Resource
win7
Behavioral task
behavioral2
Sample
Oustanding payment.exe
Resource
win10
General
-
Target
Oustanding payment.exe
-
Size
1.1MB
-
MD5
e08e4eed875f9d63a180d0e637f3b548
-
SHA1
56222b109f96af4bc3db178f5a84ec9282553bb8
-
SHA256
b929c43ad6f3aefd59485197209608aee28ba2517eba13c2cdf2fe8c6a3d1d5d
-
SHA512
14f59f9d67d00259b90f45bf90ae4fe6bbab6a41e74e3705b8e033a8312ba838e478cda168cfa32ec09d75b6584e1f419647c4fa5911a05edab5c888073f7fc6
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 900 Oustanding payment.exe Token: SeDebugPrivilege 1644 Oustanding payment.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 900 Oustanding payment.exe 1644 Oustanding payment.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1080 schtasks.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 900 wrote to memory of 1080 900 Oustanding payment.exe 24 PID 900 wrote to memory of 1080 900 Oustanding payment.exe 24 PID 900 wrote to memory of 1080 900 Oustanding payment.exe 24 PID 900 wrote to memory of 1080 900 Oustanding payment.exe 24 PID 900 wrote to memory of 1644 900 Oustanding payment.exe 26 PID 900 wrote to memory of 1644 900 Oustanding payment.exe 26 PID 900 wrote to memory of 1644 900 Oustanding payment.exe 26 PID 900 wrote to memory of 1644 900 Oustanding payment.exe 26 PID 900 wrote to memory of 1644 900 Oustanding payment.exe 26 PID 900 wrote to memory of 1644 900 Oustanding payment.exe 26 PID 900 wrote to memory of 1644 900 Oustanding payment.exe 26 PID 900 wrote to memory of 1644 900 Oustanding payment.exe 26 PID 900 wrote to memory of 1644 900 Oustanding payment.exe 26 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 900 set thread context of 1644 900 Oustanding payment.exe 26 -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Oustanding payment.exe"C:\Users\Admin\AppData\Local\Temp\Oustanding payment.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:900 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\REFOXeHHNCG" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA5B0.tmp"2⤵
- Creates scheduled task(s)
PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\Oustanding payment.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1644
-