Analysis
-
max time kernel
150s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:31
Static task
static1
Behavioral task
behavioral1
Sample
OOCS DI 20002876.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
OOCS DI 20002876.exe
Resource
win10v2004-20220414-en
General
-
Target
OOCS DI 20002876.exe
-
Size
1.4MB
-
MD5
27f8ea7f5eca57a8ad069629b50f942e
-
SHA1
2ac3264d1221cf22de0f38690dfb4bbdd2a694a1
-
SHA256
83b37e01d5d48f6a7bc0557863a4e91e84dfc8a1e721850ea265f78cbd6d275a
-
SHA512
e4dfd9a5aaab3713ca06a7d8808b3ff06c09c6c3fb101cab5d87af46a830a6447bfb66396c911e4ef3ae5fca96c60c25db633ec7f3ae09ccea22808df05d8e35
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 35 IoCs
Processes:
resource yara_rule behavioral2/memory/2912-130-0x0000000000050000-0x00000000001C2000-memory.dmp family_masslogger C:\Users\Admin\AppData\Roaming\chu.exe family_masslogger C:\Users\Admin\AppData\Roaming\chu.exe family_masslogger behavioral2/memory/3716-142-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-146-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-148-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-150-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-152-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-154-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-156-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-158-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-160-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-162-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-164-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-166-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-168-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-170-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-172-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-174-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-176-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-178-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-180-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-182-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-184-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-186-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-188-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-190-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-192-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-194-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-196-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-198-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-200-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-202-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-204-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger behavioral2/memory/3716-206-0x0000000000400000-0x00000000004B2000-memory.dmp family_masslogger -
Executes dropped EXE 2 IoCs
Processes:
chu.exeInstallUtil.exepid process 220 chu.exe 3716 InstallUtil.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
OOCS DI 20002876.exechu.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation OOCS DI 20002876.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation chu.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
chu.exedescription pid process target process PID 220 set thread context of 3716 220 chu.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
OOCS DI 20002876.exechu.exepid process 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 2912 OOCS DI 20002876.exe 220 chu.exe 220 chu.exe 220 chu.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
OOCS DI 20002876.exechu.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 2912 OOCS DI 20002876.exe Token: SeDebugPrivilege 220 chu.exe Token: SeDebugPrivilege 3716 InstallUtil.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
OOCS DI 20002876.execmd.exechu.execmd.exedescription pid process target process PID 2912 wrote to memory of 4484 2912 OOCS DI 20002876.exe cmd.exe PID 2912 wrote to memory of 4484 2912 OOCS DI 20002876.exe cmd.exe PID 2912 wrote to memory of 4484 2912 OOCS DI 20002876.exe cmd.exe PID 4484 wrote to memory of 4220 4484 cmd.exe reg.exe PID 4484 wrote to memory of 4220 4484 cmd.exe reg.exe PID 4484 wrote to memory of 4220 4484 cmd.exe reg.exe PID 2912 wrote to memory of 220 2912 OOCS DI 20002876.exe chu.exe PID 2912 wrote to memory of 220 2912 OOCS DI 20002876.exe chu.exe PID 2912 wrote to memory of 220 2912 OOCS DI 20002876.exe chu.exe PID 220 wrote to memory of 3088 220 chu.exe cmd.exe PID 220 wrote to memory of 3088 220 chu.exe cmd.exe PID 220 wrote to memory of 3088 220 chu.exe cmd.exe PID 3088 wrote to memory of 1224 3088 cmd.exe reg.exe PID 3088 wrote to memory of 1224 3088 cmd.exe reg.exe PID 3088 wrote to memory of 1224 3088 cmd.exe reg.exe PID 220 wrote to memory of 3716 220 chu.exe InstallUtil.exe PID 220 wrote to memory of 3716 220 chu.exe InstallUtil.exe PID 220 wrote to memory of 3716 220 chu.exe InstallUtil.exe PID 220 wrote to memory of 3716 220 chu.exe InstallUtil.exe PID 220 wrote to memory of 3716 220 chu.exe InstallUtil.exe PID 220 wrote to memory of 3716 220 chu.exe InstallUtil.exe PID 220 wrote to memory of 3716 220 chu.exe InstallUtil.exe PID 220 wrote to memory of 3716 220 chu.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\OOCS DI 20002876.exe"C:\Users\Admin\AppData\Local\Temp\OOCS DI 20002876.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\chu.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\chu.exe"3⤵PID:4220
-
C:\Users\Admin\AppData\Roaming\chu.exe"C:\Users\Admin\AppData\Roaming\chu.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\chu.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\chu.exe"4⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3716
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159
-
Filesize
41KB
MD55d4073b2eb6d217c19f2b22f21bf8d57
SHA1f0209900fbf08d004b886a0b3ba33ea2b0bf9da8
SHA256ac1a3f21fcc88f9cee7bf51581eafba24cc76c924f0821deb2afdf1080ddf3d3
SHA5129ac94880684933ba3407cdc135abc3047543436567af14cd9269c4adc5a6535db7b867d6de0d6238a21b94e69f9890dbb5739155871a624520623a7e56872159
-
Filesize
1.4MB
MD527f8ea7f5eca57a8ad069629b50f942e
SHA12ac3264d1221cf22de0f38690dfb4bbdd2a694a1
SHA25683b37e01d5d48f6a7bc0557863a4e91e84dfc8a1e721850ea265f78cbd6d275a
SHA512e4dfd9a5aaab3713ca06a7d8808b3ff06c09c6c3fb101cab5d87af46a830a6447bfb66396c911e4ef3ae5fca96c60c25db633ec7f3ae09ccea22808df05d8e35
-
Filesize
1.4MB
MD527f8ea7f5eca57a8ad069629b50f942e
SHA12ac3264d1221cf22de0f38690dfb4bbdd2a694a1
SHA25683b37e01d5d48f6a7bc0557863a4e91e84dfc8a1e721850ea265f78cbd6d275a
SHA512e4dfd9a5aaab3713ca06a7d8808b3ff06c09c6c3fb101cab5d87af46a830a6447bfb66396c911e4ef3ae5fca96c60c25db633ec7f3ae09ccea22808df05d8e35