Analysis
-
max time kernel
80s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-04-2022 04:24
Static task
static1
Behavioral task
behavioral1
Sample
a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe
Resource
win10v2004-20220414-en
General
-
Target
a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe
-
Size
1.1MB
-
MD5
d77ad4004f0b4c33a955c27ab30ed42f
-
SHA1
23e8c7b5eedff353bb44478a753cd6c75781b8b2
-
SHA256
a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878
-
SHA512
86965eb4ad5b2f2264f052923231b5d3fb8062c4afbdb4554f4fdddcb62386778e9b0a7a826f6ca662c5562c5b2af3de16a2520806bb0a9d2493566e84c834f8
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1408-63-0x0000000001E00000-0x0000000001E86000-memory.dmp family_masslogger behavioral1/memory/1408-62-0x0000000001E00000-0x0000000001E86000-memory.dmp family_masslogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Control Panel\International\Geo\Nation a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe -
Deletes itself 1 IoCs
Processes:
powershell.exepid process 1888 powershell.exe -
Drops startup file 1 IoCs
Processes:
notepad.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yyyyyyyyy.vbs notepad.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
Processes:
a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exedescription pid process target process PID 1072 set thread context of 1408 1072 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exepid process 1408 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exea84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exepowershell.exepid process 1072 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe 1408 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe 1408 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe 1408 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe 1408 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe 1888 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exepid process 1072 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exepowershell.exedescription pid process Token: SeDebugPrivilege 1408 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe Token: SeDebugPrivilege 1888 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exepid process 1408 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exea84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exedescription pid process target process PID 1072 wrote to memory of 940 1072 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe splwow64.exe PID 1072 wrote to memory of 940 1072 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe splwow64.exe PID 1072 wrote to memory of 940 1072 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe splwow64.exe PID 1072 wrote to memory of 940 1072 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe splwow64.exe PID 1072 wrote to memory of 1428 1072 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe notepad.exe PID 1072 wrote to memory of 1428 1072 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe notepad.exe PID 1072 wrote to memory of 1428 1072 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe notepad.exe PID 1072 wrote to memory of 1428 1072 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe notepad.exe PID 1072 wrote to memory of 1428 1072 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe notepad.exe PID 1072 wrote to memory of 1428 1072 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe notepad.exe PID 1072 wrote to memory of 1408 1072 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe PID 1072 wrote to memory of 1408 1072 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe PID 1072 wrote to memory of 1408 1072 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe PID 1072 wrote to memory of 1408 1072 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe PID 1408 wrote to memory of 1888 1408 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe powershell.exe PID 1408 wrote to memory of 1888 1408 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe powershell.exe PID 1408 wrote to memory of 1888 1408 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe powershell.exe PID 1408 wrote to memory of 1888 1408 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe powershell.exe -
outlook_office_path 1 IoCs
Processes:
a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe -
outlook_win_path 1 IoCs
Processes:
a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe"C:\Users\Admin\AppData\Local\Temp\a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:940
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Drops startup file
PID:1428
-
-
C:\Users\Admin\AppData\Local\Temp\a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe"C:\Users\Admin\AppData\Local\Temp\a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1408 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\a84c8d7d84dacffbfa80ab2eec320132c5c0789a72a1d9e85465417edfd7a878.exe'3⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-