Analysis
-
max time kernel
107s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-04-2022 09:00
Static task
static1
Behavioral task
behavioral1
Sample
Sample Inquiry Ref.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Sample Inquiry Ref.exe
Resource
win10v2004-20220414-en
General
-
Target
Sample Inquiry Ref.exe
-
Size
1.1MB
-
MD5
ea1885af97a055e92ac4ea6406df7a9b
-
SHA1
443820d9e8783200bc85329496c071ea39a7a849
-
SHA256
1c6f13d8f71f1a05425087658e39ea7460122b3bcbe94690d70003d76f7a120a
-
SHA512
4e382682abee73ec37a857535b4fdca0e3bdba2c00aa954a5697913b456219765986be4b30dcc259fae864f16c86f3b76d01453ff70ea639dff9cb1a1aeb2cce
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1632-63-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1632-64-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1632-65-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1632-66-0x000000000048178E-mapping.dmp family_masslogger behavioral1/memory/1632-68-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1632-70-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Sample Inquiry Ref.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Control Panel\International\Geo\Nation Sample Inquiry Ref.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
Processes:
Sample Inquiry Ref.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Sample Inquiry Ref.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Sample Inquiry Ref.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook Sample Inquiry Ref.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Sample Inquiry Ref.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook Sample Inquiry Ref.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Sample Inquiry Ref.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook Sample Inquiry Ref.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook Sample Inquiry Ref.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook Sample Inquiry Ref.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook Sample Inquiry Ref.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Sample Inquiry Ref.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook Sample Inquiry Ref.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Sample Inquiry Ref.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook Sample Inquiry Ref.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Sample Inquiry Ref.exedescription pid process target process PID 2000 set thread context of 1632 2000 Sample Inquiry Ref.exe Sample Inquiry Ref.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Sample Inquiry Ref.exepid process 1632 Sample Inquiry Ref.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Sample Inquiry Ref.exepowershell.exepid process 1632 Sample Inquiry Ref.exe 1632 Sample Inquiry Ref.exe 1632 Sample Inquiry Ref.exe 1632 Sample Inquiry Ref.exe 1604 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Sample Inquiry Ref.exepowershell.exedescription pid process Token: SeDebugPrivilege 1632 Sample Inquiry Ref.exe Token: SeDebugPrivilege 1604 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Sample Inquiry Ref.exepid process 1632 Sample Inquiry Ref.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Sample Inquiry Ref.exeSample Inquiry Ref.exedescription pid process target process PID 2000 wrote to memory of 1632 2000 Sample Inquiry Ref.exe Sample Inquiry Ref.exe PID 2000 wrote to memory of 1632 2000 Sample Inquiry Ref.exe Sample Inquiry Ref.exe PID 2000 wrote to memory of 1632 2000 Sample Inquiry Ref.exe Sample Inquiry Ref.exe PID 2000 wrote to memory of 1632 2000 Sample Inquiry Ref.exe Sample Inquiry Ref.exe PID 2000 wrote to memory of 1632 2000 Sample Inquiry Ref.exe Sample Inquiry Ref.exe PID 2000 wrote to memory of 1632 2000 Sample Inquiry Ref.exe Sample Inquiry Ref.exe PID 2000 wrote to memory of 1632 2000 Sample Inquiry Ref.exe Sample Inquiry Ref.exe PID 2000 wrote to memory of 1632 2000 Sample Inquiry Ref.exe Sample Inquiry Ref.exe PID 2000 wrote to memory of 1632 2000 Sample Inquiry Ref.exe Sample Inquiry Ref.exe PID 1632 wrote to memory of 1604 1632 Sample Inquiry Ref.exe powershell.exe PID 1632 wrote to memory of 1604 1632 Sample Inquiry Ref.exe powershell.exe PID 1632 wrote to memory of 1604 1632 Sample Inquiry Ref.exe powershell.exe PID 1632 wrote to memory of 1604 1632 Sample Inquiry Ref.exe powershell.exe -
outlook_office_path 1 IoCs
Processes:
Sample Inquiry Ref.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe -
outlook_win_path 1 IoCs
Processes:
Sample Inquiry Ref.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Sample Inquiry Ref.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sample Inquiry Ref.exe"C:\Users\Admin\AppData\Local\Temp\Sample Inquiry Ref.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Sample Inquiry Ref.exe"C:\Users\Admin\AppData\Local\Temp\Sample Inquiry Ref.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1632 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Sample Inquiry Ref.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-