Analysis
-
max time kernel
46s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 14:17
Static task
static1
Behavioral task
behavioral1
Sample
Maersk Ratesheet.Scan...exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Maersk Ratesheet.Scan...exe
Resource
win10v2004-20220414-en
General
-
Target
Maersk Ratesheet.Scan...exe
-
Size
1.2MB
-
MD5
74cff6e4840dd481d888d12f89629f4a
-
SHA1
4d8b01c1939faf241abdeef11e87a16c498bc2e2
-
SHA256
53b4179d18dc27443d5182752aaf6d78253ec7fc4eac192dcf6078884af51535
-
SHA512
9a3edd39d511c4098cc976d072a2d0b628aaff76be126f5b1143a8114cf56183aed64aacbca48b8ce5086a79f4b1acbc16144a2800e9b10a558604cdbc90adeb
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\3B8E3C2477\Log.txt
masslogger
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 31 IoCs
Processes:
resource yara_rule behavioral1/memory/948-58-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-60-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-63-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-65-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-67-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-69-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-71-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-73-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-75-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-77-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-79-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-81-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-83-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-89-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-87-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-85-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-91-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-93-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-95-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-99-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-103-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-101-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-105-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-107-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-111-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-113-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-115-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-117-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-119-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-109-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger behavioral1/memory/948-97-0x0000000000620000-0x00000000006C8000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Maersk Ratesheet.Scan...exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Control Panel\International\Geo\Nation Maersk Ratesheet.Scan...exe -
Drops startup file 1 IoCs
Processes:
notepad.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vvbn.vbs notepad.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Maersk Ratesheet.Scan...exedescription pid process target process PID 1884 set thread context of 948 1884 Maersk Ratesheet.Scan...exe Maersk Ratesheet.Scan...exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Maersk Ratesheet.Scan...exeMaersk Ratesheet.Scan...exepid process 1884 Maersk Ratesheet.Scan...exe 948 Maersk Ratesheet.Scan...exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Maersk Ratesheet.Scan...exepid process 1884 Maersk Ratesheet.Scan...exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Maersk Ratesheet.Scan...exedescription pid process Token: SeDebugPrivilege 948 Maersk Ratesheet.Scan...exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Maersk Ratesheet.Scan...exedescription pid process target process PID 1884 wrote to memory of 1396 1884 Maersk Ratesheet.Scan...exe notepad.exe PID 1884 wrote to memory of 1396 1884 Maersk Ratesheet.Scan...exe notepad.exe PID 1884 wrote to memory of 1396 1884 Maersk Ratesheet.Scan...exe notepad.exe PID 1884 wrote to memory of 1396 1884 Maersk Ratesheet.Scan...exe notepad.exe PID 1884 wrote to memory of 1396 1884 Maersk Ratesheet.Scan...exe notepad.exe PID 1884 wrote to memory of 1396 1884 Maersk Ratesheet.Scan...exe notepad.exe PID 1884 wrote to memory of 948 1884 Maersk Ratesheet.Scan...exe Maersk Ratesheet.Scan...exe PID 1884 wrote to memory of 948 1884 Maersk Ratesheet.Scan...exe Maersk Ratesheet.Scan...exe PID 1884 wrote to memory of 948 1884 Maersk Ratesheet.Scan...exe Maersk Ratesheet.Scan...exe PID 1884 wrote to memory of 948 1884 Maersk Ratesheet.Scan...exe Maersk Ratesheet.Scan...exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Maersk Ratesheet.Scan...exe"C:\Users\Admin\AppData\Local\Temp\Maersk Ratesheet.Scan...exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Drops startup file
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\Maersk Ratesheet.Scan...exe"C:\Users\Admin\AppData\Local\Temp\Maersk Ratesheet.Scan...exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948