Analysis
-
max time kernel
71s -
max time network
115s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
15-07-2020 18:23
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order-7-15-2020.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
Purchase Order-7-15-2020.exe
Resource
win10
General
-
Target
Purchase Order-7-15-2020.exe
-
Size
952KB
-
MD5
c6b0da8a4b100bee3958498acdbcf97d
-
SHA1
1bb228742a3a201edafbfbaa12f796f3a460a1c0
-
SHA256
e745073f173f603b6200a9fc9e6975ee72a9c3395c1868471056e651ae1470e5
-
SHA512
da382870c1eecabe4c6abc1ea4374cea481f9bd511cd6ac4cd4d77b5a71f8cdb0eef4fab488cfdf0bcca5a707e8ae2aa83f5540748bdc0b832c9426abb4f6207
Malware Config
Extracted
C:\Users\Admin\AppData\Local\C8A579F880\Log.txt
masslogger
Signatures
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1500 set thread context of 1736 1500 Purchase Order-7-15-2020.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1736 Purchase Order-7-15-2020.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1836 schtasks.exe -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1500 wrote to memory of 1836 1500 Purchase Order-7-15-2020.exe 26 PID 1500 wrote to memory of 1836 1500 Purchase Order-7-15-2020.exe 26 PID 1500 wrote to memory of 1836 1500 Purchase Order-7-15-2020.exe 26 PID 1500 wrote to memory of 1836 1500 Purchase Order-7-15-2020.exe 26 PID 1500 wrote to memory of 1736 1500 Purchase Order-7-15-2020.exe 28 PID 1500 wrote to memory of 1736 1500 Purchase Order-7-15-2020.exe 28 PID 1500 wrote to memory of 1736 1500 Purchase Order-7-15-2020.exe 28 PID 1500 wrote to memory of 1736 1500 Purchase Order-7-15-2020.exe 28 PID 1500 wrote to memory of 1736 1500 Purchase Order-7-15-2020.exe 28 PID 1500 wrote to memory of 1736 1500 Purchase Order-7-15-2020.exe 28 PID 1500 wrote to memory of 1736 1500 Purchase Order-7-15-2020.exe 28 PID 1500 wrote to memory of 1736 1500 Purchase Order-7-15-2020.exe 28 PID 1500 wrote to memory of 1736 1500 Purchase Order-7-15-2020.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1736 Purchase Order-7-15-2020.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order-7-15-2020.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order-7-15-2020.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yCPYOps" /XML "C:\Users\Admin\AppData\Local\Temp\tmp32D2.tmp"2⤵
- Creates scheduled task(s)
PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order-7-15-2020.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1736
-