Analysis
-
max time kernel
130s -
max time network
217s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 13:01
Static task
static1
Behavioral task
behavioral1
Sample
49b64249d56b43b7e92112ebde5e20d9ae67cd88a2fa1d856eed251fc328cefb.zip
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
49b64249d56b43b7e92112ebde5e20d9ae67cd88a2fa1d856eed251fc328cefb.zip
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
DESIGNS ARTWORK FOR ORDER.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
DESIGNS ARTWORK FOR ORDER.exe
Resource
win10v2004-20220414-en
General
-
Target
DESIGNS ARTWORK FOR ORDER.exe
-
Size
867KB
-
MD5
73b302dc6804f0099e0957150f7a5782
-
SHA1
c6cc6631668f0f8132651bd01dd4ca0303dd5fb1
-
SHA256
0b59a5ffd1da84a9bf88fc0c49d758fb8288f1e9564111ec5c4f8e0ffa91940d
-
SHA512
81f8751498372369f7dcdeb8a16a8d4a3460dfe64a59e1ec703a1f2a71e53d322ecd32b7a47039ee03f0628132b164806aef522a2ddd97013b41e2c32a3b61d3
Malware Config
Extracted
C:\Users\Admin\AppData\Local\3B8E3C2477\Log.txt
masslogger
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 6 IoCs
Processes:
resource yara_rule behavioral3/memory/1988-62-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral3/memory/1988-63-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral3/memory/1988-64-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral3/memory/1988-65-0x00000000004B2FAE-mapping.dmp family_masslogger behavioral3/memory/1988-67-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral3/memory/1988-69-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
DESIGNS ARTWORK FOR ORDER.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Control Panel\International\Geo\Nation DESIGNS ARTWORK FOR ORDER.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral3/memory/1352-57-0x0000000000540000-0x0000000000550000-memory.dmp agile_net behavioral3/memory/1352-58-0x0000000000700000-0x0000000000712000-memory.dmp agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
Processes:
DESIGNS ARTWORK FOR ORDER.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook DESIGNS ARTWORK FOR ORDER.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook DESIGNS ARTWORK FOR ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook DESIGNS ARTWORK FOR ORDER.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook DESIGNS ARTWORK FOR ORDER.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook DESIGNS ARTWORK FOR ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook DESIGNS ARTWORK FOR ORDER.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook DESIGNS ARTWORK FOR ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook DESIGNS ARTWORK FOR ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook DESIGNS ARTWORK FOR ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook DESIGNS ARTWORK FOR ORDER.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook DESIGNS ARTWORK FOR ORDER.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook DESIGNS ARTWORK FOR ORDER.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook DESIGNS ARTWORK FOR ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook DESIGNS ARTWORK FOR ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DESIGNS ARTWORK FOR ORDER.exedescription pid process target process PID 1352 set thread context of 1988 1352 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
DESIGNS ARTWORK FOR ORDER.exepid process 1988 DESIGNS ARTWORK FOR ORDER.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
DESIGNS ARTWORK FOR ORDER.exeDESIGNS ARTWORK FOR ORDER.exepid process 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1352 DESIGNS ARTWORK FOR ORDER.exe 1988 DESIGNS ARTWORK FOR ORDER.exe 1988 DESIGNS ARTWORK FOR ORDER.exe 1988 DESIGNS ARTWORK FOR ORDER.exe 1988 DESIGNS ARTWORK FOR ORDER.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
DESIGNS ARTWORK FOR ORDER.exeDESIGNS ARTWORK FOR ORDER.exedescription pid process Token: SeDebugPrivilege 1352 DESIGNS ARTWORK FOR ORDER.exe Token: SeDebugPrivilege 1988 DESIGNS ARTWORK FOR ORDER.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
DESIGNS ARTWORK FOR ORDER.exepid process 1988 DESIGNS ARTWORK FOR ORDER.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
DESIGNS ARTWORK FOR ORDER.exedescription pid process target process PID 1352 wrote to memory of 1988 1352 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe PID 1352 wrote to memory of 1988 1352 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe PID 1352 wrote to memory of 1988 1352 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe PID 1352 wrote to memory of 1988 1352 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe PID 1352 wrote to memory of 1988 1352 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe PID 1352 wrote to memory of 1988 1352 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe PID 1352 wrote to memory of 1988 1352 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe PID 1352 wrote to memory of 1988 1352 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe PID 1352 wrote to memory of 1988 1352 DESIGNS ARTWORK FOR ORDER.exe DESIGNS ARTWORK FOR ORDER.exe -
outlook_office_path 1 IoCs
Processes:
DESIGNS ARTWORK FOR ORDER.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe -
outlook_win_path 1 IoCs
Processes:
DESIGNS ARTWORK FOR ORDER.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DESIGNS ARTWORK FOR ORDER.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DESIGNS ARTWORK FOR ORDER.exe"C:\Users\Admin\AppData\Local\Temp\DESIGNS ARTWORK FOR ORDER.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\DESIGNS ARTWORK FOR ORDER.exe"C:\Users\Admin\AppData\Local\Temp\DESIGNS ARTWORK FOR ORDER.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1988