Analysis
-
max time kernel
142s -
max time network
130s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
09/07/2020, 18:31
Static task
static1
Behavioral task
behavioral1
Sample
Sales note PO53.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
Sales note PO53.exe
Resource
win10v200430
General
-
Target
Sales note PO53.exe
-
Size
861KB
-
MD5
3e414d89b9f98f4cc6c5988634791c0a
-
SHA1
fd7d1e1c6b49b97db475ccc56958bee3964ad766
-
SHA256
1c2f10aaf4e8b9a9e90316e8b470616bac893609cd85374cb11bb4a1a3971e5b
-
SHA512
a7781136e267d2549d9f248830951170f4b6eaabbaa212df3307362a895414ae85ece41c25d1256e09302d5b1c603ca45d1e1753dac85ed5493acb2b8cbe6508
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 676 wrote to memory of 1712 676 Sales note PO53.exe 26 PID 676 wrote to memory of 1712 676 Sales note PO53.exe 26 PID 676 wrote to memory of 1712 676 Sales note PO53.exe 26 PID 676 wrote to memory of 1712 676 Sales note PO53.exe 26 PID 676 wrote to memory of 1712 676 Sales note PO53.exe 26 PID 676 wrote to memory of 1712 676 Sales note PO53.exe 26 PID 676 wrote to memory of 1712 676 Sales note PO53.exe 26 PID 676 wrote to memory of 1712 676 Sales note PO53.exe 26 PID 676 wrote to memory of 1712 676 Sales note PO53.exe 26 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 676 set thread context of 1712 676 Sales note PO53.exe 26 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1712 Sales note PO53.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1712 Sales note PO53.exe -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sales note PO53.exe"C:\Users\Admin\AppData\Local\Temp\Sales note PO53.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:676 -
C:\Users\Admin\AppData\Local\Temp\Sales note PO53.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1712
-