Analysis
-
max time kernel
99s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-04-2022 08:50
Static task
static1
Behavioral task
behavioral1
Sample
Zona Industrial.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Zona Industrial.exe
Resource
win10v2004-20220414-en
General
-
Target
Zona Industrial.exe
-
Size
614KB
-
MD5
b19684558dec68ee45b19b99ff06244c
-
SHA1
90025801b69b7bfc7b6ccc231e3a767276aa164a
-
SHA256
ec8e1726c79994f38b1137b7652d7e31eea1ac4c9edc32ddb0888bb31b138fed
-
SHA512
6020a275d55dfbb2eba8b3c7cb8fedf97e3d1e7b647bd6b4ed1a9813f96269f187ba3f1bb2f5ece270a12ded8dee5ee7c8cedee4aecf0bac292b7b449744c306
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\79FE0CC911\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
suckmydick22@
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Zona Industrial.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\International\Geo\Nation Zona Industrial.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
Processes:
Zona Industrial.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Zona Industrial.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Zona Industrial.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Zona Industrial.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Zona Industrial.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Zona Industrial.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Zona Industrial.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Zona Industrial.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Zona Industrial.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Zona Industrial.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Zona Industrial.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Zona Industrial.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Zona Industrial.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Zona Industrial.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Zona Industrial.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Zona Industrial.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Zona Industrial.exedescription pid process target process PID 1516 set thread context of 1756 1516 Zona Industrial.exe Zona Industrial.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Zona Industrial.exepid process 1756 Zona Industrial.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Zona Industrial.exepid process 1756 Zona Industrial.exe 1756 Zona Industrial.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Zona Industrial.exedescription pid process Token: SeDebugPrivilege 1756 Zona Industrial.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Zona Industrial.exepid process 1756 Zona Industrial.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Zona Industrial.exedescription pid process target process PID 1516 wrote to memory of 1756 1516 Zona Industrial.exe Zona Industrial.exe PID 1516 wrote to memory of 1756 1516 Zona Industrial.exe Zona Industrial.exe PID 1516 wrote to memory of 1756 1516 Zona Industrial.exe Zona Industrial.exe PID 1516 wrote to memory of 1756 1516 Zona Industrial.exe Zona Industrial.exe PID 1516 wrote to memory of 1756 1516 Zona Industrial.exe Zona Industrial.exe PID 1516 wrote to memory of 1756 1516 Zona Industrial.exe Zona Industrial.exe PID 1516 wrote to memory of 1756 1516 Zona Industrial.exe Zona Industrial.exe PID 1516 wrote to memory of 1756 1516 Zona Industrial.exe Zona Industrial.exe PID 1516 wrote to memory of 1756 1516 Zona Industrial.exe Zona Industrial.exe -
outlook_office_path 1 IoCs
Processes:
Zona Industrial.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Zona Industrial.exe -
outlook_win_path 1 IoCs
Processes:
Zona Industrial.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Zona Industrial.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zona Industrial.exe"C:\Users\Admin\AppData\Local\Temp\Zona Industrial.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\Zona Industrial.exe"{path}"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1756
-