Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 01:37
Static task
static1
Behavioral task
behavioral1
Sample
RFQ TC3363 554 ref 5578.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
RFQ TC3363 554 ref 5578.exe
Resource
win10v2004-20220414-en
General
-
Target
RFQ TC3363 554 ref 5578.exe
-
Size
930KB
-
MD5
b420ec9b5e7102e29376ed8035492676
-
SHA1
e78dde3f48dbb4cff8a0a156c240ad4f25fac806
-
SHA256
61ab7d6bc7b5b5a3f90635ed4208d0528155a4283b1deb656e194caf198cba80
-
SHA512
2f7297fad8c4c06f07aeb176ef17526a5d7d1f5ec278019ce5a09fa0460db7cf69569721d4d7d25bb45efb9d8c1caca4acc3783d2317bdb02ddad84d2ce5a135
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 32 IoCs
Processes:
resource yara_rule behavioral2/memory/4440-142-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-144-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-146-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-148-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-152-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-150-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-154-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-156-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-158-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-160-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-162-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-164-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-166-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-168-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-170-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-172-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-174-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-176-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-178-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-180-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-182-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-184-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-186-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-188-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-190-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-192-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-194-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-196-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-198-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-200-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-202-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral2/memory/4440-204-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
RFQ TC3363 554 ref 5578.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation RFQ TC3363 554 ref 5578.exe -
Accesses Microsoft Outlook profiles 1 TTPs 18 IoCs
Processes:
MSBuild.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook MSBuild.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook MSBuild.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook MSBuild.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook MSBuild.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook MSBuild.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook MSBuild.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 23 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
RFQ TC3363 554 ref 5578.exedescription pid process target process PID 2496 set thread context of 4440 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
MSBuild.exepid process 4440 MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
RFQ TC3363 554 ref 5578.exeMSBuild.exepid process 2496 RFQ TC3363 554 ref 5578.exe 2496 RFQ TC3363 554 ref 5578.exe 2496 RFQ TC3363 554 ref 5578.exe 2496 RFQ TC3363 554 ref 5578.exe 2496 RFQ TC3363 554 ref 5578.exe 2496 RFQ TC3363 554 ref 5578.exe 2496 RFQ TC3363 554 ref 5578.exe 2496 RFQ TC3363 554 ref 5578.exe 4440 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RFQ TC3363 554 ref 5578.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 2496 RFQ TC3363 554 ref 5578.exe Token: SeDebugPrivilege 4440 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MSBuild.exepid process 4440 MSBuild.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
RFQ TC3363 554 ref 5578.exedescription pid process target process PID 2496 wrote to memory of 1672 2496 RFQ TC3363 554 ref 5578.exe schtasks.exe PID 2496 wrote to memory of 1672 2496 RFQ TC3363 554 ref 5578.exe schtasks.exe PID 2496 wrote to memory of 1672 2496 RFQ TC3363 554 ref 5578.exe schtasks.exe PID 2496 wrote to memory of 1200 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 1200 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 1200 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 4332 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 4332 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 4332 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 4416 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 4416 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 4416 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 4428 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 4428 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 4428 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 4440 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 4440 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 4440 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 4440 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 4440 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 4440 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 4440 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe PID 2496 wrote to memory of 4440 2496 RFQ TC3363 554 ref 5578.exe MSBuild.exe -
outlook_office_path 1 IoCs
Processes:
MSBuild.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
Processes:
MSBuild.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ TC3363 554 ref 5578.exe"C:\Users\Admin\AppData\Local\Temp\RFQ TC3363 554 ref 5578.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\juAYXSrOw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBBA4.tmp"2⤵
- Creates scheduled task(s)
PID:1672
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵PID:1200
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵PID:4332
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵PID:4416
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵PID:4428
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4440
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cd9dc93c84d16f2bd15edffa941d0e98
SHA1df628a263cc3db883f7f7a5a84ede146d5358bfb
SHA25699340f1b313c168b30569fa250b1e3de8a4af4585dd9b1f9db684d7865d9617b
SHA5126e04f643d4964547f17944ed85b7c4b118f097b2aa35f10291da4e2596184c0123cbde0103d444f5ed2b131fd1397c8ff05e1a3353dac4800cdb531d10fcb933