Analysis
-
max time kernel
93s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-04-2022 08:52
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Enquiry.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Purchase Enquiry.exe
Resource
win10v2004-20220414-en
General
-
Target
Purchase Enquiry.exe
-
Size
861KB
-
MD5
a2d838c6e251e6090ed3c6a3920f5f1c
-
SHA1
dd72443878e710ca004b7f9e69f6c35be633d48f
-
SHA256
0d882f1f12ca2d8198129db908eb0cef60a375ab3796950751fc2111a60f49a8
-
SHA512
8abd27283e8b05fb4a66c6769c18c5910dac9c3a37d002b38be55232312451c20d94408899aa17639b7a89120ccacf7a19555d1ebc149abbc0cddf35c090054d
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1752-63-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1752-64-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1752-65-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1752-66-0x0000000000481BEE-mapping.dmp family_masslogger behavioral1/memory/1752-68-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1752-70-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Purchase Enquiry.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Control Panel\International\Geo\Nation Purchase Enquiry.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
Processes:
Purchase Enquiry.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Purchase Enquiry.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook Purchase Enquiry.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook Purchase Enquiry.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook Purchase Enquiry.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook Purchase Enquiry.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook Purchase Enquiry.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Purchase Enquiry.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Purchase Enquiry.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Purchase Enquiry.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook Purchase Enquiry.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook Purchase Enquiry.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Purchase Enquiry.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Purchase Enquiry.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook Purchase Enquiry.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Purchase Enquiry.exedescription pid process target process PID 336 set thread context of 1752 336 Purchase Enquiry.exe Purchase Enquiry.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Purchase Enquiry.exepid process 1752 Purchase Enquiry.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Purchase Enquiry.exepowershell.exepid process 1752 Purchase Enquiry.exe 1752 Purchase Enquiry.exe 1752 Purchase Enquiry.exe 1752 Purchase Enquiry.exe 736 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Purchase Enquiry.exepowershell.exedescription pid process Token: SeDebugPrivilege 1752 Purchase Enquiry.exe Token: SeDebugPrivilege 736 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Purchase Enquiry.exepid process 1752 Purchase Enquiry.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
Purchase Enquiry.exePurchase Enquiry.exedescription pid process target process PID 336 wrote to memory of 2032 336 Purchase Enquiry.exe schtasks.exe PID 336 wrote to memory of 2032 336 Purchase Enquiry.exe schtasks.exe PID 336 wrote to memory of 2032 336 Purchase Enquiry.exe schtasks.exe PID 336 wrote to memory of 2032 336 Purchase Enquiry.exe schtasks.exe PID 336 wrote to memory of 1752 336 Purchase Enquiry.exe Purchase Enquiry.exe PID 336 wrote to memory of 1752 336 Purchase Enquiry.exe Purchase Enquiry.exe PID 336 wrote to memory of 1752 336 Purchase Enquiry.exe Purchase Enquiry.exe PID 336 wrote to memory of 1752 336 Purchase Enquiry.exe Purchase Enquiry.exe PID 336 wrote to memory of 1752 336 Purchase Enquiry.exe Purchase Enquiry.exe PID 336 wrote to memory of 1752 336 Purchase Enquiry.exe Purchase Enquiry.exe PID 336 wrote to memory of 1752 336 Purchase Enquiry.exe Purchase Enquiry.exe PID 336 wrote to memory of 1752 336 Purchase Enquiry.exe Purchase Enquiry.exe PID 336 wrote to memory of 1752 336 Purchase Enquiry.exe Purchase Enquiry.exe PID 1752 wrote to memory of 736 1752 Purchase Enquiry.exe powershell.exe PID 1752 wrote to memory of 736 1752 Purchase Enquiry.exe powershell.exe PID 1752 wrote to memory of 736 1752 Purchase Enquiry.exe powershell.exe PID 1752 wrote to memory of 736 1752 Purchase Enquiry.exe powershell.exe -
outlook_office_path 1 IoCs
Processes:
Purchase Enquiry.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe -
outlook_win_path 1 IoCs
Processes:
Purchase Enquiry.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Enquiry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Enquiry.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Enquiry.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xbGCKTyLmcr" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFF85.tmp"2⤵
- Creates scheduled task(s)
PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Enquiry.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Enquiry.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1752 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Purchase Enquiry.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:736
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cc5a06553e510299e7646b301e18c7f2
SHA17c906b85a0898d3431576502d2a391eaad7adb34
SHA25645d5e2385f11fd0ad4d03ff5f1c23b2125ab74e6d9895253b414bed010fa777c
SHA5127fd638695e78c69c8ee43ba9d8935e177abfff931d10676c7b945e1d8be534ba951d2a1ccee69bd01a6db0ee7f50cc1c25918626410a448d89e244564b18e328