Analysis
-
max time kernel
105s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-04-2022 09:00
Static task
static1
Behavioral task
behavioral1
Sample
Order Item list With Samples.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Order Item list With Samples.exe
Resource
win10v2004-20220414-en
General
-
Target
Order Item list With Samples.exe
-
Size
1.1MB
-
MD5
e5631d010f22580deada6cd6a32cac23
-
SHA1
8a37aefab3741d074ffa6c5a9b1e77bcd8130bc5
-
SHA256
c82f95325307d64b524bae80ff2cdc3e5db082842f2148de16d8c3e9ffc66773
-
SHA512
0b31077fd6e2a99ee0685d8adb0010b9b7a8b5ac7de18f42508365583608cffe0030b09dcb577e67beaf71abbf73ee8316fe3697a99a899a91314adf2c7c9369
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1964-63-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1964-64-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1964-65-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1964-66-0x000000000048178E-mapping.dmp family_masslogger behavioral1/memory/1964-68-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger behavioral1/memory/1964-70-0x0000000000400000-0x0000000000486000-memory.dmp family_masslogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Order Item list With Samples.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Control Panel\International\Geo\Nation Order Item list With Samples.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
Processes:
Order Item list With Samples.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Order Item list With Samples.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook Order Item list With Samples.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook Order Item list With Samples.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook Order Item list With Samples.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Order Item list With Samples.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook Order Item list With Samples.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook Order Item list With Samples.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Order Item list With Samples.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Order Item list With Samples.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook Order Item list With Samples.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Order Item list With Samples.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook Order Item list With Samples.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook Order Item list With Samples.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Order Item list With Samples.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Order Item list With Samples.exedescription pid process target process PID 1032 set thread context of 1964 1032 Order Item list With Samples.exe Order Item list With Samples.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Order Item list With Samples.exepid process 1964 Order Item list With Samples.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Order Item list With Samples.exepowershell.exepid process 1964 Order Item list With Samples.exe 1964 Order Item list With Samples.exe 1964 Order Item list With Samples.exe 1964 Order Item list With Samples.exe 648 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Order Item list With Samples.exepowershell.exedescription pid process Token: SeDebugPrivilege 1964 Order Item list With Samples.exe Token: SeDebugPrivilege 648 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Order Item list With Samples.exepid process 1964 Order Item list With Samples.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Order Item list With Samples.exeOrder Item list With Samples.exedescription pid process target process PID 1032 wrote to memory of 1964 1032 Order Item list With Samples.exe Order Item list With Samples.exe PID 1032 wrote to memory of 1964 1032 Order Item list With Samples.exe Order Item list With Samples.exe PID 1032 wrote to memory of 1964 1032 Order Item list With Samples.exe Order Item list With Samples.exe PID 1032 wrote to memory of 1964 1032 Order Item list With Samples.exe Order Item list With Samples.exe PID 1032 wrote to memory of 1964 1032 Order Item list With Samples.exe Order Item list With Samples.exe PID 1032 wrote to memory of 1964 1032 Order Item list With Samples.exe Order Item list With Samples.exe PID 1032 wrote to memory of 1964 1032 Order Item list With Samples.exe Order Item list With Samples.exe PID 1032 wrote to memory of 1964 1032 Order Item list With Samples.exe Order Item list With Samples.exe PID 1032 wrote to memory of 1964 1032 Order Item list With Samples.exe Order Item list With Samples.exe PID 1964 wrote to memory of 648 1964 Order Item list With Samples.exe powershell.exe PID 1964 wrote to memory of 648 1964 Order Item list With Samples.exe powershell.exe PID 1964 wrote to memory of 648 1964 Order Item list With Samples.exe powershell.exe PID 1964 wrote to memory of 648 1964 Order Item list With Samples.exe powershell.exe -
outlook_office_path 1 IoCs
Processes:
Order Item list With Samples.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe -
outlook_win_path 1 IoCs
Processes:
Order Item list With Samples.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Item list With Samples.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order Item list With Samples.exe"C:\Users\Admin\AppData\Local\Temp\Order Item list With Samples.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\Order Item list With Samples.exe"C:\Users\Admin\AppData\Local\Temp\Order Item list With Samples.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1964 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Order Item list With Samples.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:648
-
-