Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
24-12-2020 14:20
Static task
static1
Behavioral task
behavioral1
Sample
OOCLU57731000013.xls.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
OOCLU57731000013.xls.exe
Resource
win10v20201028
General
-
Target
OOCLU57731000013.xls.exe
-
Size
892KB
-
MD5
7c3df39bc1a99d5b392330206083461b
-
SHA1
7f60f5dc06d5f4a91d606312747bbc770226bbb3
-
SHA256
14836e19f657b3a82b1f58dfb846ff1eb66f72ea7eb9b840c2de4b2ceeddcddd
-
SHA512
3cab1494e1a137045c0b7eb005c169fb56b26efc7754b80ff44090502c11a4f96d36b0bd403cc309e0b9fca4220bad4cdcaa8b6905483fbb9d4ec000964c9985
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/656-7-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/656-8-0x000000000048149E-mapping.dmp family_masslogger behavioral1/memory/656-9-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/656-10-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1736-68-0x000000000048149E-mapping.dmp family_masslogger -
Executes dropped EXE 2 IoCs
Processes:
nslookup.exenslookup.exepid process 1964 nslookup.exe 1736 nslookup.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
OOCLU57731000013.xls.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Control Panel\International\Geo\Nation OOCLU57731000013.xls.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1648 cmd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
Processes:
OOCLU57731000013.xls.exenslookup.exedescription pid process target process PID 788 set thread context of 656 788 OOCLU57731000013.xls.exe OOCLU57731000013.xls.exe PID 1964 set thread context of 1736 1964 nslookup.exe nslookup.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1672 timeout.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
OOCLU57731000013.xls.exepowershell.exenslookup.exepid process 656 OOCLU57731000013.xls.exe 656 OOCLU57731000013.xls.exe 656 OOCLU57731000013.xls.exe 656 OOCLU57731000013.xls.exe 1136 powershell.exe 1136 powershell.exe 1736 nslookup.exe 1736 nslookup.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
OOCLU57731000013.xls.exepowershell.exenslookup.exedescription pid process Token: SeDebugPrivilege 656 OOCLU57731000013.xls.exe Token: SeDebugPrivilege 1136 powershell.exe Token: SeDebugPrivilege 1736 nslookup.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
OOCLU57731000013.xls.exeOOCLU57731000013.xls.execmd.execmd.exenslookup.exedescription pid process target process PID 788 wrote to memory of 656 788 OOCLU57731000013.xls.exe OOCLU57731000013.xls.exe PID 788 wrote to memory of 656 788 OOCLU57731000013.xls.exe OOCLU57731000013.xls.exe PID 788 wrote to memory of 656 788 OOCLU57731000013.xls.exe OOCLU57731000013.xls.exe PID 788 wrote to memory of 656 788 OOCLU57731000013.xls.exe OOCLU57731000013.xls.exe PID 788 wrote to memory of 656 788 OOCLU57731000013.xls.exe OOCLU57731000013.xls.exe PID 788 wrote to memory of 656 788 OOCLU57731000013.xls.exe OOCLU57731000013.xls.exe PID 788 wrote to memory of 656 788 OOCLU57731000013.xls.exe OOCLU57731000013.xls.exe PID 788 wrote to memory of 656 788 OOCLU57731000013.xls.exe OOCLU57731000013.xls.exe PID 788 wrote to memory of 656 788 OOCLU57731000013.xls.exe OOCLU57731000013.xls.exe PID 656 wrote to memory of 1136 656 OOCLU57731000013.xls.exe powershell.exe PID 656 wrote to memory of 1136 656 OOCLU57731000013.xls.exe powershell.exe PID 656 wrote to memory of 1136 656 OOCLU57731000013.xls.exe powershell.exe PID 656 wrote to memory of 1136 656 OOCLU57731000013.xls.exe powershell.exe PID 656 wrote to memory of 1596 656 OOCLU57731000013.xls.exe cmd.exe PID 656 wrote to memory of 1596 656 OOCLU57731000013.xls.exe cmd.exe PID 656 wrote to memory of 1596 656 OOCLU57731000013.xls.exe cmd.exe PID 656 wrote to memory of 1596 656 OOCLU57731000013.xls.exe cmd.exe PID 656 wrote to memory of 1648 656 OOCLU57731000013.xls.exe cmd.exe PID 656 wrote to memory of 1648 656 OOCLU57731000013.xls.exe cmd.exe PID 656 wrote to memory of 1648 656 OOCLU57731000013.xls.exe cmd.exe PID 656 wrote to memory of 1648 656 OOCLU57731000013.xls.exe cmd.exe PID 1596 wrote to memory of 1296 1596 cmd.exe schtasks.exe PID 1596 wrote to memory of 1296 1596 cmd.exe schtasks.exe PID 1596 wrote to memory of 1296 1596 cmd.exe schtasks.exe PID 1596 wrote to memory of 1296 1596 cmd.exe schtasks.exe PID 1648 wrote to memory of 1672 1648 cmd.exe timeout.exe PID 1648 wrote to memory of 1672 1648 cmd.exe timeout.exe PID 1648 wrote to memory of 1672 1648 cmd.exe timeout.exe PID 1648 wrote to memory of 1672 1648 cmd.exe timeout.exe PID 1648 wrote to memory of 1964 1648 cmd.exe nslookup.exe PID 1648 wrote to memory of 1964 1648 cmd.exe nslookup.exe PID 1648 wrote to memory of 1964 1648 cmd.exe nslookup.exe PID 1648 wrote to memory of 1964 1648 cmd.exe nslookup.exe PID 1964 wrote to memory of 1736 1964 nslookup.exe nslookup.exe PID 1964 wrote to memory of 1736 1964 nslookup.exe nslookup.exe PID 1964 wrote to memory of 1736 1964 nslookup.exe nslookup.exe PID 1964 wrote to memory of 1736 1964 nslookup.exe nslookup.exe PID 1964 wrote to memory of 1736 1964 nslookup.exe nslookup.exe PID 1964 wrote to memory of 1736 1964 nslookup.exe nslookup.exe PID 1964 wrote to memory of 1736 1964 nslookup.exe nslookup.exe PID 1964 wrote to memory of 1736 1964 nslookup.exe nslookup.exe PID 1964 wrote to memory of 1736 1964 nslookup.exe nslookup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\OOCLU57731000013.xls.exe"C:\Users\Admin\AppData\Local\Temp\OOCLU57731000013.xls.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\OOCLU57731000013.xls.exe"{path}"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\OOCLU57731000013.xls.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn nslookup.exe /tr '"C:\Users\Admin\AppData\Roaming\vilan\nslookup.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn nslookup.exe /tr '"C:\Users\Admin\AppData\Roaming\vilan\nslookup.exe"'4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp816F.tmp.bat""3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\vilan\nslookup.exe"C:\Users\Admin\AppData\Roaming\vilan\nslookup.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\vilan\nslookup.exe"{path}"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp816F.tmp.batMD5
f4c4a0186a46aad34e511d45c18a8407
SHA116e87144ef500c85821e5895c1db9aa2d63c38b6
SHA256c9509a312e3cb56cb72b7a7063ce1455436be8a76797601486116fdf50a47049
SHA5123d5b38f894e8f7fd03d6678dcf89f3f2ebcada8cad1b8100f6b9cf4761f408909785653ded0ca052ce20e2e45ba5f30fb930488ed85bda4acd9fc220331555cc
-
C:\Users\Admin\AppData\Roaming\vilan\nslookup.exeMD5
7c3df39bc1a99d5b392330206083461b
SHA17f60f5dc06d5f4a91d606312747bbc770226bbb3
SHA25614836e19f657b3a82b1f58dfb846ff1eb66f72ea7eb9b840c2de4b2ceeddcddd
SHA5123cab1494e1a137045c0b7eb005c169fb56b26efc7754b80ff44090502c11a4f96d36b0bd403cc309e0b9fca4220bad4cdcaa8b6905483fbb9d4ec000964c9985
-
C:\Users\Admin\AppData\Roaming\vilan\nslookup.exeMD5
7c3df39bc1a99d5b392330206083461b
SHA17f60f5dc06d5f4a91d606312747bbc770226bbb3
SHA25614836e19f657b3a82b1f58dfb846ff1eb66f72ea7eb9b840c2de4b2ceeddcddd
SHA5123cab1494e1a137045c0b7eb005c169fb56b26efc7754b80ff44090502c11a4f96d36b0bd403cc309e0b9fca4220bad4cdcaa8b6905483fbb9d4ec000964c9985
-
C:\Users\Admin\AppData\Roaming\vilan\nslookup.exeMD5
7c3df39bc1a99d5b392330206083461b
SHA17f60f5dc06d5f4a91d606312747bbc770226bbb3
SHA25614836e19f657b3a82b1f58dfb846ff1eb66f72ea7eb9b840c2de4b2ceeddcddd
SHA5123cab1494e1a137045c0b7eb005c169fb56b26efc7754b80ff44090502c11a4f96d36b0bd403cc309e0b9fca4220bad4cdcaa8b6905483fbb9d4ec000964c9985
-
\Users\Admin\AppData\Roaming\vilan\nslookup.exeMD5
7c3df39bc1a99d5b392330206083461b
SHA17f60f5dc06d5f4a91d606312747bbc770226bbb3
SHA25614836e19f657b3a82b1f58dfb846ff1eb66f72ea7eb9b840c2de4b2ceeddcddd
SHA5123cab1494e1a137045c0b7eb005c169fb56b26efc7754b80ff44090502c11a4f96d36b0bd403cc309e0b9fca4220bad4cdcaa8b6905483fbb9d4ec000964c9985
-
memory/656-9-0x0000000000400000-0x0000000000486000-memory.dmpFilesize
536KB
-
memory/656-8-0x000000000048149E-mapping.dmp
-
memory/656-10-0x0000000000400000-0x0000000000486000-memory.dmpFilesize
536KB
-
memory/656-11-0x0000000074DA0000-0x000000007548E000-memory.dmpFilesize
6.9MB
-
memory/656-7-0x0000000000400000-0x0000000000486000-memory.dmpFilesize
536KB
-
memory/788-6-0x0000000005EB0000-0x0000000005F4E000-memory.dmpFilesize
632KB
-
memory/788-5-0x00000000002A0000-0x00000000002A4000-memory.dmpFilesize
16KB
-
memory/788-3-0x00000000010F0000-0x00000000010F1000-memory.dmpFilesize
4KB
-
memory/788-2-0x0000000074DA0000-0x000000007548E000-memory.dmpFilesize
6.9MB
-
memory/1136-23-0x0000000002520000-0x0000000002521000-memory.dmpFilesize
4KB
-
memory/1136-49-0x0000000006280000-0x0000000006281000-memory.dmpFilesize
4KB
-
memory/1136-14-0x0000000000000000-mapping.dmp
-
memory/1136-65-0x0000000006310000-0x0000000006311000-memory.dmpFilesize
4KB
-
memory/1136-64-0x0000000006300000-0x0000000006301000-memory.dmpFilesize
4KB
-
memory/1136-24-0x0000000002860000-0x0000000002861000-memory.dmpFilesize
4KB
-
memory/1136-27-0x0000000005650000-0x0000000005651000-memory.dmpFilesize
4KB
-
memory/1136-17-0x00000000009B0000-0x00000000009B1000-memory.dmpFilesize
4KB
-
memory/1136-16-0x0000000074DA0000-0x000000007548E000-memory.dmpFilesize
6.9MB
-
memory/1136-50-0x00000000055D0000-0x00000000055D1000-memory.dmpFilesize
4KB
-
memory/1136-20-0x0000000004930000-0x0000000004931000-memory.dmpFilesize
4KB
-
memory/1136-42-0x00000000061A0000-0x00000000061A1000-memory.dmpFilesize
4KB
-
memory/1136-41-0x0000000006040000-0x0000000006041000-memory.dmpFilesize
4KB
-
memory/1296-19-0x0000000000000000-mapping.dmp
-
memory/1596-15-0x0000000000000000-mapping.dmp
-
memory/1648-18-0x0000000000000000-mapping.dmp
-
memory/1672-22-0x0000000000000000-mapping.dmp
-
memory/1736-68-0x000000000048149E-mapping.dmp
-
memory/1736-72-0x0000000074D20000-0x000000007540E000-memory.dmpFilesize
6.9MB
-
memory/1964-38-0x00000000011D0000-0x00000000011D1000-memory.dmpFilesize
4KB
-
memory/1964-36-0x0000000074DA0000-0x000000007548E000-memory.dmpFilesize
6.9MB
-
memory/1964-32-0x0000000000000000-mapping.dmp
-
memory/1964-31-0x0000000000000000-mapping.dmp