Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 13:24
Static task
static1
Behavioral task
behavioral1
Sample
Company Profile.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Company Profile.exe
Resource
win10v2004-20220414-en
General
-
Target
Company Profile.exe
-
Size
2.1MB
-
MD5
c29a529830426b09db4a2e8fabea26d7
-
SHA1
e533dad57fd624eacc2627afa7d55ca728142e11
-
SHA256
796be4e7eb4f284e2d1747b4bd8b7b5479a15b00b14c857ac27e40411d6415c8
-
SHA512
308fd89df7ff1b61b0ec72eb2f108ec5ade4b3886e6258634f9a6237deffaec0e521deac8390fad1438933a42c03d5d4a3819ff817f5d30d12c029d16881c07a
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 60 IoCs
Processes:
resource yara_rule behavioral1/memory/972-57-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-62-0x0000000000171AEE-mapping.dmp family_masslogger behavioral1/memory/972-63-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-64-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-67-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-68-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-70-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-69-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-71-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-72-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-73-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-74-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-75-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-76-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-78-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-80-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-77-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-81-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-82-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-84-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-83-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-79-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-85-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-86-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-88-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-90-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-91-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-93-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-95-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-98-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-97-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-100-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-99-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-101-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-102-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-96-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-107-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-108-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-109-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-106-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-105-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-103-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-104-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-94-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-92-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-89-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-110-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-112-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-116-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-117-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-118-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-120-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-119-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-115-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-114-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-113-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-111-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/972-87-0x00000000000D0000-0x0000000000176000-memory.dmp family_masslogger behavioral1/memory/1872-326-0x0000000000121AEE-mapping.dmp family_masslogger behavioral1/memory/1872-329-0x0000000000080000-0x0000000000126000-memory.dmp family_masslogger -
MassLogger log file 2 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file masslogger_log_file -
Accesses Microsoft Outlook profiles 1 TTPs 21 IoCs
Processes:
MSBuild.exeMSBuild.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook MSBuild.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook MSBuild.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook MSBuild.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook MSBuild.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 8 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Company Profile.exedescription pid process target process PID 1756 set thread context of 972 1756 Company Profile.exe MSBuild.exe PID 1756 set thread context of 1872 1756 Company Profile.exe MSBuild.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
MSBuild.exeMSBuild.exepid process 972 MSBuild.exe 1872 MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
Company Profile.exeMSBuild.exeMSBuild.exepid process 1756 Company Profile.exe 1756 Company Profile.exe 1756 Company Profile.exe 1756 Company Profile.exe 972 MSBuild.exe 1756 Company Profile.exe 1756 Company Profile.exe 1756 Company Profile.exe 1756 Company Profile.exe 1756 Company Profile.exe 1756 Company Profile.exe 1756 Company Profile.exe 1872 MSBuild.exe 1756 Company Profile.exe 1756 Company Profile.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
MSBuild.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 972 MSBuild.exe Token: SeDebugPrivilege 1872 MSBuild.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Company Profile.exepid process 1756 Company Profile.exe 1756 Company Profile.exe 1756 Company Profile.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Company Profile.exepid process 1756 Company Profile.exe 1756 Company Profile.exe 1756 Company Profile.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
MSBuild.exeMSBuild.exepid process 972 MSBuild.exe 1872 MSBuild.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Company Profile.exedescription pid process target process PID 1756 wrote to memory of 972 1756 Company Profile.exe MSBuild.exe PID 1756 wrote to memory of 972 1756 Company Profile.exe MSBuild.exe PID 1756 wrote to memory of 972 1756 Company Profile.exe MSBuild.exe PID 1756 wrote to memory of 972 1756 Company Profile.exe MSBuild.exe PID 1756 wrote to memory of 972 1756 Company Profile.exe MSBuild.exe PID 1756 wrote to memory of 972 1756 Company Profile.exe MSBuild.exe PID 1756 wrote to memory of 1872 1756 Company Profile.exe MSBuild.exe PID 1756 wrote to memory of 1872 1756 Company Profile.exe MSBuild.exe PID 1756 wrote to memory of 1872 1756 Company Profile.exe MSBuild.exe PID 1756 wrote to memory of 1872 1756 Company Profile.exe MSBuild.exe PID 1756 wrote to memory of 1872 1756 Company Profile.exe MSBuild.exe PID 1756 wrote to memory of 1872 1756 Company Profile.exe MSBuild.exe -
outlook_office_path 1 IoCs
Processes:
MSBuild.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
Processes:
MSBuild.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Company Profile.exe"C:\Users\Admin\AppData\Local\Temp\Company Profile.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\MSBuild.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:972 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v4.0.30319\\\\MSBuild.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1872