Malware Analysis Report

2025-04-14 05:13

Sample ID 201211-35vfe1cxwa
Target GH09227834.exe
SHA256 785e9b897ab7051dd056f69c5f1e98bb7280c3cf464718f0c18493f226901d4d
Tags
masslogger persistence ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

785e9b897ab7051dd056f69c5f1e98bb7280c3cf464718f0c18493f226901d4d

Threat Level: Known bad

The file GH09227834.exe was found to be: Known bad.

Malicious Activity Summary

masslogger persistence ransomware spyware stealer

MassLogger Main Payload

MassLogger

MassLogger log file

ServiceHost packer

Executes dropped EXE

Checks computer location settings

Reads user/profile data of web browsers

Loads dropped DLL

Looks up external IP address via web service

Adds Run key to start application

Suspicious use of SetThreadContext

Program crash

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: AddClipboardFormatListener

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2020-12-11 19:12

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2020-12-11 19:12

Reported

2020-12-11 19:15

Platform

win7v20201028

Max time kernel

147s

Max time network

135s

Command Line

"C:\Users\Admin\AppData\Local\Temp\GH09227834.exe"

Signatures

MassLogger

stealer spyware masslogger

MassLogger Main Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

MassLogger log file

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\GH09227834.exe N/A

Reads user/profile data of web browsers

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\unrmo = "C:\\Users\\Admin\\AppData\\Roaming\\Ofkdj\\unrmo.url" C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1584 set thread context of 368 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1584 set thread context of 1940 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1640 wrote to memory of 1584 N/A C:\Users\Admin\AppData\Local\Temp\GH09227834.exe C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe
PID 1640 wrote to memory of 1584 N/A C:\Users\Admin\AppData\Local\Temp\GH09227834.exe C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe
PID 1640 wrote to memory of 1584 N/A C:\Users\Admin\AppData\Local\Temp\GH09227834.exe C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe
PID 1640 wrote to memory of 1584 N/A C:\Users\Admin\AppData\Local\Temp\GH09227834.exe C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe
PID 1584 wrote to memory of 368 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1584 wrote to memory of 368 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1584 wrote to memory of 368 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1584 wrote to memory of 368 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1584 wrote to memory of 368 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1584 wrote to memory of 368 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1584 wrote to memory of 368 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1584 wrote to memory of 368 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1584 wrote to memory of 368 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1584 wrote to memory of 368 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1584 wrote to memory of 368 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1584 wrote to memory of 368 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
PID 1584 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe
PID 1584 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe
PID 1584 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe
PID 1584 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe
PID 1584 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe
PID 1584 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe
PID 1584 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe
PID 1584 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe
PID 1584 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe

Processes

C:\Users\Admin\AppData\Local\Temp\GH09227834.exe

"C:\Users\Admin\AppData\Local\Temp\GH09227834.exe"

C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe

"C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"

C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe

"C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe"

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 api.ipify.org udp
N/A 54.235.142.93:80 api.ipify.org tcp

Files

memory/1640-2-0x00000000745C0000-0x0000000074CAE000-memory.dmp

memory/1640-3-0x0000000000C70000-0x0000000000C71000-memory.dmp

memory/1640-5-0x0000000000450000-0x0000000000454000-memory.dmp

memory/1640-7-0x0000000000490000-0x00000000004C4000-memory.dmp

\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe

MD5 8612ece9e9e0e5bc387570f6b2de8d0a
SHA1 8415a4951184de481880739186388cffb772d82b
SHA256 785e9b897ab7051dd056f69c5f1e98bb7280c3cf464718f0c18493f226901d4d
SHA512 4e6d582b3c5245f8a051263284587f267df9f15cd3dc498cdfc2d3bcd1be2a2eaaabf030fc558cece57e41ceac09c76cf891b54b6edf7d3c8e212ec0b3349426

memory/1584-10-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe

MD5 8612ece9e9e0e5bc387570f6b2de8d0a
SHA1 8415a4951184de481880739186388cffb772d82b
SHA256 785e9b897ab7051dd056f69c5f1e98bb7280c3cf464718f0c18493f226901d4d
SHA512 4e6d582b3c5245f8a051263284587f267df9f15cd3dc498cdfc2d3bcd1be2a2eaaabf030fc558cece57e41ceac09c76cf891b54b6edf7d3c8e212ec0b3349426

C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe

MD5 8612ece9e9e0e5bc387570f6b2de8d0a
SHA1 8415a4951184de481880739186388cffb772d82b
SHA256 785e9b897ab7051dd056f69c5f1e98bb7280c3cf464718f0c18493f226901d4d
SHA512 4e6d582b3c5245f8a051263284587f267df9f15cd3dc498cdfc2d3bcd1be2a2eaaabf030fc558cece57e41ceac09c76cf891b54b6edf7d3c8e212ec0b3349426

memory/1584-13-0x00000000745C0000-0x0000000074CAE000-memory.dmp

memory/1584-14-0x0000000000070000-0x0000000000071000-memory.dmp

memory/368-20-0x0000000000400000-0x0000000000414000-memory.dmp

memory/368-22-0x0000000000400000-0x0000000000414000-memory.dmp

memory/368-23-0x0000000000400000-0x0000000000414000-memory.dmp

memory/368-21-0x000000000040E15E-mapping.dmp

memory/368-24-0x00000000745C0000-0x0000000074CAE000-memory.dmp

memory/1940-26-0x00000000004A2C7E-mapping.dmp

memory/1940-28-0x0000000000400000-0x00000000004A8000-memory.dmp

memory/1940-29-0x0000000000400000-0x00000000004A8000-memory.dmp

memory/1940-31-0x00000000745C0000-0x0000000074CAE000-memory.dmp

C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe

MD5 8612ece9e9e0e5bc387570f6b2de8d0a
SHA1 8415a4951184de481880739186388cffb772d82b
SHA256 785e9b897ab7051dd056f69c5f1e98bb7280c3cf464718f0c18493f226901d4d
SHA512 4e6d582b3c5245f8a051263284587f267df9f15cd3dc498cdfc2d3bcd1be2a2eaaabf030fc558cece57e41ceac09c76cf891b54b6edf7d3c8e212ec0b3349426

memory/1940-25-0x0000000000400000-0x00000000004A8000-memory.dmp

memory/368-35-0x0000000000320000-0x0000000000324000-memory.dmp

C:\Users\Admin\AppData\Roaming\Ofkdj\unrmo.url

MD5 51c0fa73a92c7d2dbeba2d7aecd8313e
SHA1 6f30943a3654fe764b7141fc4f618ea700340a88
SHA256 5fc6a32e1c964221bcd2d188b0d271304856f41749d5d0e08a1fc95ac90265b4
SHA512 f4e442870e80c049414b7ae2d33f47bce98d873a0651f42cbba2ce4b97e2c5b0e78dc6ed6b4b46eeb6bf982c6eb7f94c9e11821deaabec76c77c88e263a6adb9

memory/1940-37-0x0000000000730000-0x000000000076E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2020-12-11 19:12

Reported

2020-12-11 19:15

Platform

win10v20201028

Max time kernel

138s

Max time network

140s

Command Line

"C:\Users\Admin\AppData\Local\Temp\GH09227834.exe"

Signatures

ServiceHost packer

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe N/A

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\WerFault.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\WerFault.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WerFault.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\GH09227834.exe

"C:\Users\Admin\AppData\Local\Temp\GH09227834.exe"

C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe

"C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2424 -s 1236

Network

Country Destination Domain Proto
N/A 13.107.4.52:80 www.msftconnecttest.com tcp

Files

memory/1628-2-0x0000000073840000-0x0000000073F2E000-memory.dmp

memory/1628-3-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

memory/1628-5-0x0000000005A30000-0x0000000005A31000-memory.dmp

memory/1628-6-0x0000000005630000-0x0000000005631000-memory.dmp

memory/1628-7-0x0000000005600000-0x0000000005604000-memory.dmp

memory/1628-9-0x00000000057D0000-0x0000000005804000-memory.dmp

memory/2424-11-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe

MD5 8612ece9e9e0e5bc387570f6b2de8d0a
SHA1 8415a4951184de481880739186388cffb772d82b
SHA256 785e9b897ab7051dd056f69c5f1e98bb7280c3cf464718f0c18493f226901d4d
SHA512 4e6d582b3c5245f8a051263284587f267df9f15cd3dc498cdfc2d3bcd1be2a2eaaabf030fc558cece57e41ceac09c76cf891b54b6edf7d3c8e212ec0b3349426

C:\Users\Admin\AppData\Roaming\Ofkdj\faxoy.exe

MD5 8612ece9e9e0e5bc387570f6b2de8d0a
SHA1 8415a4951184de481880739186388cffb772d82b
SHA256 785e9b897ab7051dd056f69c5f1e98bb7280c3cf464718f0c18493f226901d4d
SHA512 4e6d582b3c5245f8a051263284587f267df9f15cd3dc498cdfc2d3bcd1be2a2eaaabf030fc558cece57e41ceac09c76cf891b54b6edf7d3c8e212ec0b3349426

memory/2424-14-0x0000000073840000-0x0000000073F2E000-memory.dmp

memory/1172-23-0x0000000004C50000-0x0000000004C51000-memory.dmp

memory/2424-24-0x0000000000000000-mapping.dmp

memory/2424-25-0x0000000000000000-mapping.dmp

memory/2424-26-0x0000000000000000-mapping.dmp

memory/2424-27-0x0000000000000000-mapping.dmp

memory/2424-28-0x0000000000000000-mapping.dmp

memory/2424-29-0x0000000000000000-mapping.dmp

memory/2424-30-0x0000000000000000-mapping.dmp

memory/2424-31-0x0000000000000000-mapping.dmp

memory/2424-32-0x0000000000000000-mapping.dmp

memory/2424-33-0x0000000000000000-mapping.dmp

memory/2424-34-0x0000000000000000-mapping.dmp

memory/2424-35-0x0000000000000000-mapping.dmp

memory/1172-36-0x0000000005280000-0x0000000005281000-memory.dmp