Analysis
-
max time kernel
134s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20/04/2022, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe
Resource
win10v2004-20220414-en
General
-
Target
a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe
-
Size
1.0MB
-
MD5
c0ed9bbcff47e00344d20760e249ae66
-
SHA1
d38438bc727646bccd72bed89428b69753b2178a
-
SHA256
a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63
-
SHA512
8c7b5def759dfeeb2e4d962a419a2f33adfcdb0668be37696eda9fe5ae81752a43b41b3415fb4a5c2be496f7c471a70be0725dd6f50725e86c9e666fec70eef7
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 1 IoCs
resource yara_rule behavioral2/memory/2364-145-0x00000000005B0000-0x0000000000636000-memory.dmp family_masslogger -
Executes dropped EXE 2 IoCs
pid Process 2496 batt.exe 2364 batt.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation batt.exe -
Loads dropped DLL 1 IoCs
pid Process 2496 batt.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook batt.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook batt.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook batt.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook batt.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook batt.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook batt.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook batt.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\batt = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\Music\\batt.exe" reg.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2496 set thread context of 2364 2496 batt.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2364 batt.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 2496 batt.exe 2364 batt.exe 2364 batt.exe 2364 batt.exe 2364 batt.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe Token: SeTakeOwnershipPrivilege 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe Token: SeRestorePrivilege 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe Token: SeDebugPrivilege 2496 batt.exe Token: SeTakeOwnershipPrivilege 2496 batt.exe Token: SeRestorePrivilege 2496 batt.exe Token: SeDebugPrivilege 2364 batt.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2364 batt.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 816 wrote to memory of 4288 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 84 PID 816 wrote to memory of 4288 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 84 PID 816 wrote to memory of 4288 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 84 PID 4288 wrote to memory of 2272 4288 cmd.exe 86 PID 4288 wrote to memory of 2272 4288 cmd.exe 86 PID 4288 wrote to memory of 2272 4288 cmd.exe 86 PID 816 wrote to memory of 2496 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 87 PID 816 wrote to memory of 2496 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 87 PID 816 wrote to memory of 2496 816 a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe 87 PID 2496 wrote to memory of 2364 2496 batt.exe 88 PID 2496 wrote to memory of 2364 2496 batt.exe 88 PID 2496 wrote to memory of 2364 2496 batt.exe 88 PID 2496 wrote to memory of 2364 2496 batt.exe 88 PID 2496 wrote to memory of 2364 2496 batt.exe 88 PID 2496 wrote to memory of 2364 2496 batt.exe 88 PID 2496 wrote to memory of 2364 2496 batt.exe 88 PID 2496 wrote to memory of 2364 2496 batt.exe 88 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 batt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe"C:\Users\Admin\AppData\Local\Temp\a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v batt /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Music\batt.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v batt /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Music\batt.exe"3⤵
- Adds Run key to start application
PID:2272
-
-
-
C:\Users\Admin\Music\batt.exe"C:\Users\Admin\Music\batt.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\Music\batt.exe"C:\Users\Admin\Music\batt.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2364
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5769d8660bec929b34823b17aa9a84297
SHA1d4c40a5a6bc25d4bfd4c7442fbebfa1255cd322f
SHA25619cb9087c56aeccc56ec96363dfe7128b651d7c450c81e453e2e29f3fabf8da3
SHA5122b16f6d92a616b26a06c196c4a123d2959e626f97d328cb69e11e3715e71aa083f66083f68a90ac85e2bccb6e963eac5173dda1023fe5c64f45d78a8c38f2883
-
Filesize
94KB
MD514ff402962ad21b78ae0b4c43cd1f194
SHA1f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b
-
Filesize
1.0MB
MD5c0ed9bbcff47e00344d20760e249ae66
SHA1d38438bc727646bccd72bed89428b69753b2178a
SHA256a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63
SHA5128c7b5def759dfeeb2e4d962a419a2f33adfcdb0668be37696eda9fe5ae81752a43b41b3415fb4a5c2be496f7c471a70be0725dd6f50725e86c9e666fec70eef7
-
Filesize
1.0MB
MD5c0ed9bbcff47e00344d20760e249ae66
SHA1d38438bc727646bccd72bed89428b69753b2178a
SHA256a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63
SHA5128c7b5def759dfeeb2e4d962a419a2f33adfcdb0668be37696eda9fe5ae81752a43b41b3415fb4a5c2be496f7c471a70be0725dd6f50725e86c9e666fec70eef7
-
Filesize
1.0MB
MD5c0ed9bbcff47e00344d20760e249ae66
SHA1d38438bc727646bccd72bed89428b69753b2178a
SHA256a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63
SHA5128c7b5def759dfeeb2e4d962a419a2f33adfcdb0668be37696eda9fe5ae81752a43b41b3415fb4a5c2be496f7c471a70be0725dd6f50725e86c9e666fec70eef7