Analysis
-
max time kernel
135s -
max time network
137s -
platform
windows7_x64 -
resource
win7 -
submitted
09/07/2020, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
OOCS DI 20002876.exe
Resource
win7
Behavioral task
behavioral2
Sample
OOCS DI 20002876.exe
Resource
win10v200430
General
-
Target
OOCS DI 20002876.exe
-
Size
1.3MB
-
MD5
d82419cc06e18b5cdf23f72a4b58c483
-
SHA1
149b6f3866d88292183f8d5af23c877e1d8fd60f
-
SHA256
70048d51529f09683d5180eb0e410297fa0332f155e213ebefc8fb750389177f
-
SHA512
b708bb5fc22bf5a93e830f99672ffa58783f0152d6bba2af94e960d68d2ba2b02813e20493b9711c23e860204d81152c2dec12ce53f6644e9f188e56454dcc9c
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\E2C1E8F1FA\Log.txt
masslogger
Signatures
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1496 OOCS DI 20002876.exe 1496 OOCS DI 20002876.exe 1496 OOCS DI 20002876.exe 1852 chu.exe 1852 chu.exe 1852 chu.exe 2020 InstallUtil.exe 2020 InstallUtil.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1496 wrote to memory of 1036 1496 OOCS DI 20002876.exe 24 PID 1496 wrote to memory of 1036 1496 OOCS DI 20002876.exe 24 PID 1496 wrote to memory of 1036 1496 OOCS DI 20002876.exe 24 PID 1496 wrote to memory of 1036 1496 OOCS DI 20002876.exe 24 PID 1036 wrote to memory of 1520 1036 cmd.exe 26 PID 1036 wrote to memory of 1520 1036 cmd.exe 26 PID 1036 wrote to memory of 1520 1036 cmd.exe 26 PID 1036 wrote to memory of 1520 1036 cmd.exe 26 PID 1496 wrote to memory of 1852 1496 OOCS DI 20002876.exe 27 PID 1496 wrote to memory of 1852 1496 OOCS DI 20002876.exe 27 PID 1496 wrote to memory of 1852 1496 OOCS DI 20002876.exe 27 PID 1496 wrote to memory of 1852 1496 OOCS DI 20002876.exe 27 PID 1852 wrote to memory of 2000 1852 chu.exe 30 PID 1852 wrote to memory of 2000 1852 chu.exe 30 PID 1852 wrote to memory of 2000 1852 chu.exe 30 PID 1852 wrote to memory of 2000 1852 chu.exe 30 PID 2000 wrote to memory of 1940 2000 cmd.exe 32 PID 2000 wrote to memory of 1940 2000 cmd.exe 32 PID 2000 wrote to memory of 1940 2000 cmd.exe 32 PID 2000 wrote to memory of 1940 2000 cmd.exe 32 PID 1852 wrote to memory of 2020 1852 chu.exe 33 PID 1852 wrote to memory of 2020 1852 chu.exe 33 PID 1852 wrote to memory of 2020 1852 chu.exe 33 PID 1852 wrote to memory of 2020 1852 chu.exe 33 PID 1852 wrote to memory of 2020 1852 chu.exe 33 PID 1852 wrote to memory of 2020 1852 chu.exe 33 PID 1852 wrote to memory of 2020 1852 chu.exe 33 PID 1852 wrote to memory of 2020 1852 chu.exe 33 PID 1852 wrote to memory of 2020 1852 chu.exe 33 PID 1852 wrote to memory of 2020 1852 chu.exe 33 PID 1852 wrote to memory of 2020 1852 chu.exe 33 PID 1852 wrote to memory of 2020 1852 chu.exe 33 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1852 set thread context of 2020 1852 chu.exe 33 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2020 InstallUtil.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2020 InstallUtil.exe -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1496 OOCS DI 20002876.exe Token: SeDebugPrivilege 1852 chu.exe Token: SeDebugPrivilege 2020 InstallUtil.exe -
Executes dropped EXE 2 IoCs
pid Process 1852 chu.exe 2020 InstallUtil.exe -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Loads dropped DLL 2 IoCs
pid Process 1496 OOCS DI 20002876.exe 1852 chu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\OOCS DI 20002876.exe"C:\Users\Admin\AppData\Local\Temp\OOCS DI 20002876.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Loads dropped DLL
PID:1496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\chu.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\chu.exe"3⤵PID:1520
-
-
-
C:\Users\Admin\AppData\Roaming\chu.exe"C:\Users\Admin\AppData\Roaming\chu.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Executes dropped EXE
- Loads dropped DLL
PID:1852 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\chu.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\chu.exe"4⤵PID:1940
-
-
-
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Executes dropped EXE
PID:2020
-
-