Analysis
-
max time kernel
88s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-04-2022 04:06
Static task
static1
Behavioral task
behavioral1
Sample
Inquriy List Ref.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Inquriy List Ref.exe
Resource
win10v2004-20220414-en
General
-
Target
Inquriy List Ref.exe
-
Size
897KB
-
MD5
c0989fcd6a3bb3c463d4e6cf10bc2b78
-
SHA1
26a804e261e9e5741858ebc475692d2c17a4ad42
-
SHA256
18536d644a7be6098da4f895bac325297f0a4c08252f6b98f9cab510f004e8ce
-
SHA512
9fbde9b86f9c9ba0ddd1ee227350294f69904a39a614b1d9ce810394771de8ad06f3033ace86059fe2fc8d42ef2d56e0c045760709a5bc80dea2dcdb9150f173
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1272-61-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1272-62-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1272-63-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1272-64-0x000000000048178E-mapping.dmp family_masslogger behavioral1/memory/1272-66-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1272-68-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Inquriy List Ref.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Control Panel\International\Geo\Nation Inquriy List Ref.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
Processes:
Inquriy List Ref.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Inquriy List Ref.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook Inquriy List Ref.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook Inquriy List Ref.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook Inquriy List Ref.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook Inquriy List Ref.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook Inquriy List Ref.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Inquriy List Ref.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Inquriy List Ref.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Inquriy List Ref.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Inquriy List Ref.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Inquriy List Ref.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook Inquriy List Ref.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook Inquriy List Ref.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook Inquriy List Ref.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Inquriy List Ref.exedescription pid process target process PID 1700 set thread context of 1272 1700 Inquriy List Ref.exe Inquriy List Ref.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Inquriy List Ref.exepid process 1272 Inquriy List Ref.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Inquriy List Ref.exepowershell.exepid process 1272 Inquriy List Ref.exe 1272 Inquriy List Ref.exe 1272 Inquriy List Ref.exe 1272 Inquriy List Ref.exe 1636 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Inquriy List Ref.exepowershell.exedescription pid process Token: SeDebugPrivilege 1272 Inquriy List Ref.exe Token: SeDebugPrivilege 1636 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Inquriy List Ref.exepid process 1272 Inquriy List Ref.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Inquriy List Ref.exeInquriy List Ref.exedescription pid process target process PID 1700 wrote to memory of 1272 1700 Inquriy List Ref.exe Inquriy List Ref.exe PID 1700 wrote to memory of 1272 1700 Inquriy List Ref.exe Inquriy List Ref.exe PID 1700 wrote to memory of 1272 1700 Inquriy List Ref.exe Inquriy List Ref.exe PID 1700 wrote to memory of 1272 1700 Inquriy List Ref.exe Inquriy List Ref.exe PID 1700 wrote to memory of 1272 1700 Inquriy List Ref.exe Inquriy List Ref.exe PID 1700 wrote to memory of 1272 1700 Inquriy List Ref.exe Inquriy List Ref.exe PID 1700 wrote to memory of 1272 1700 Inquriy List Ref.exe Inquriy List Ref.exe PID 1700 wrote to memory of 1272 1700 Inquriy List Ref.exe Inquriy List Ref.exe PID 1700 wrote to memory of 1272 1700 Inquriy List Ref.exe Inquriy List Ref.exe PID 1272 wrote to memory of 1636 1272 Inquriy List Ref.exe powershell.exe PID 1272 wrote to memory of 1636 1272 Inquriy List Ref.exe powershell.exe PID 1272 wrote to memory of 1636 1272 Inquriy List Ref.exe powershell.exe PID 1272 wrote to memory of 1636 1272 Inquriy List Ref.exe powershell.exe -
outlook_office_path 1 IoCs
Processes:
Inquriy List Ref.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe -
outlook_win_path 1 IoCs
Processes:
Inquriy List Ref.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Inquriy List Ref.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Inquriy List Ref.exe"C:\Users\Admin\AppData\Local\Temp\Inquriy List Ref.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\Inquriy List Ref.exe"C:\Users\Admin\AppData\Local\Temp\Inquriy List Ref.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1272 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Inquriy List Ref.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-