Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
09/07/2020, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
Sales note PO53.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
Sales note PO53.exe
Resource
win10
General
-
Target
Sales note PO53.exe
-
Size
861KB
-
MD5
3e414d89b9f98f4cc6c5988634791c0a
-
SHA1
fd7d1e1c6b49b97db475ccc56958bee3964ad766
-
SHA256
1c2f10aaf4e8b9a9e90316e8b470616bac893609cd85374cb11bb4a1a3971e5b
-
SHA512
a7781136e267d2549d9f248830951170f4b6eaabbaa212df3307362a895414ae85ece41c25d1256e09302d5b1c603ca45d1e1753dac85ed5493acb2b8cbe6508
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1312 Sales note PO53.exe 1824 Sales note PO53.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1312 set thread context of 1824 1312 Sales note PO53.exe 27 -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1312 wrote to memory of 1808 1312 Sales note PO53.exe 26 PID 1312 wrote to memory of 1808 1312 Sales note PO53.exe 26 PID 1312 wrote to memory of 1808 1312 Sales note PO53.exe 26 PID 1312 wrote to memory of 1808 1312 Sales note PO53.exe 26 PID 1312 wrote to memory of 1824 1312 Sales note PO53.exe 27 PID 1312 wrote to memory of 1824 1312 Sales note PO53.exe 27 PID 1312 wrote to memory of 1824 1312 Sales note PO53.exe 27 PID 1312 wrote to memory of 1824 1312 Sales note PO53.exe 27 PID 1312 wrote to memory of 1824 1312 Sales note PO53.exe 27 PID 1312 wrote to memory of 1824 1312 Sales note PO53.exe 27 PID 1312 wrote to memory of 1824 1312 Sales note PO53.exe 27 PID 1312 wrote to memory of 1824 1312 Sales note PO53.exe 27 PID 1312 wrote to memory of 1824 1312 Sales note PO53.exe 27 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1312 Sales note PO53.exe Token: SeDebugPrivilege 1824 Sales note PO53.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sales note PO53.exe"C:\Users\Admin\AppData\Local\Temp\Sales note PO53.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\Sales note PO53.exe"{path}"2⤵PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\Sales note PO53.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1824
-