Analysis
-
max time kernel
86s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 00:43
Static task
static1
Behavioral task
behavioral1
Sample
PO46221905.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PO46221905.exe
Resource
win10v2004-20220414-en
General
-
Target
PO46221905.exe
-
Size
841KB
-
MD5
6de2607d6b582340ac160517edd8feb9
-
SHA1
ae820bd10915292a37a5d927147138c4a92e7a8b
-
SHA256
0ce85115b26d769cc29342f77c359fc2177d325e5394154fdc700ea644f69971
-
SHA512
cd8997e25192e83d4d815066355933d4c31df96e47f3214b620e9d9ddb5aee7e132e101473e7d1b2eda83831f5c1f0ed0392d8e79455cf08022cbf55660c8126
Malware Config
Extracted
C:\Users\Admin\AppData\Local\8506BBE7FF\Log.txt
masslogger
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1364-62-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral1/memory/1364-61-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral1/memory/1364-63-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral1/memory/1364-66-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral1/memory/1364-64-0x00000000004B33FE-mapping.dmp family_masslogger behavioral1/memory/1364-68-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
PO46221905.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Control Panel\International\Geo\Nation PO46221905.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
Processes:
PO46221905.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook PO46221905.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook PO46221905.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook PO46221905.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook PO46221905.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook PO46221905.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook PO46221905.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook PO46221905.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PO46221905.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PO46221905.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook PO46221905.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook PO46221905.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook PO46221905.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook PO46221905.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook PO46221905.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PO46221905.exedescription pid process target process PID 2000 set thread context of 1364 2000 PO46221905.exe PO46221905.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
PO46221905.exepid process 1364 PO46221905.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
PO46221905.exePO46221905.exepid process 2000 PO46221905.exe 2000 PO46221905.exe 2000 PO46221905.exe 2000 PO46221905.exe 2000 PO46221905.exe 1364 PO46221905.exe 1364 PO46221905.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
PO46221905.exePO46221905.exedescription pid process Token: SeDebugPrivilege 2000 PO46221905.exe Token: SeDebugPrivilege 1364 PO46221905.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
PO46221905.exepid process 1364 PO46221905.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
PO46221905.exedescription pid process target process PID 2000 wrote to memory of 1356 2000 PO46221905.exe PO46221905.exe PID 2000 wrote to memory of 1356 2000 PO46221905.exe PO46221905.exe PID 2000 wrote to memory of 1356 2000 PO46221905.exe PO46221905.exe PID 2000 wrote to memory of 1356 2000 PO46221905.exe PO46221905.exe PID 2000 wrote to memory of 1364 2000 PO46221905.exe PO46221905.exe PID 2000 wrote to memory of 1364 2000 PO46221905.exe PO46221905.exe PID 2000 wrote to memory of 1364 2000 PO46221905.exe PO46221905.exe PID 2000 wrote to memory of 1364 2000 PO46221905.exe PO46221905.exe PID 2000 wrote to memory of 1364 2000 PO46221905.exe PO46221905.exe PID 2000 wrote to memory of 1364 2000 PO46221905.exe PO46221905.exe PID 2000 wrote to memory of 1364 2000 PO46221905.exe PO46221905.exe PID 2000 wrote to memory of 1364 2000 PO46221905.exe PO46221905.exe PID 2000 wrote to memory of 1364 2000 PO46221905.exe PO46221905.exe -
outlook_office_path 1 IoCs
Processes:
PO46221905.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe -
outlook_win_path 1 IoCs
Processes:
PO46221905.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO46221905.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO46221905.exe"C:\Users\Admin\AppData\Local\Temp\PO46221905.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\PO46221905.exe"{path}"2⤵PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\PO46221905.exe"{path}"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1364
-