Analysis
-
max time kernel
95s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:38
Static task
static1
Behavioral task
behavioral1
Sample
Order Specifications.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Order Specifications.exe
Resource
win10v2004-20220414-en
General
-
Target
Order Specifications.exe
-
Size
737KB
-
MD5
1ea58404a64b36f8e367510d6c4d7062
-
SHA1
9590069d7efa8767f8362c7d74a39ffd117c054d
-
SHA256
f17e96a6ff93adedce32a09ce613d3e9bc33bf1a0555a56f3ec5882dee032b15
-
SHA512
57065dc6de25ae00a7d9d3fc0990d5c8f9a2a072363575ef2a334613baefc0703a4bcf618eb8137cf17e90a4e01a847fe62b598a28c1a6958b02548cf95a6c7a
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/2040-62-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-64-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-63-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-65-0x00000000004A15EE-mapping.dmp family_masslogger behavioral1/memory/2040-67-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-69-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-71-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-73-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-75-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-77-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-79-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-81-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-83-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-85-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-87-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-89-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-91-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-93-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-95-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-97-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-99-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-101-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-103-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-105-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-107-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-109-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-111-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-113-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-115-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-117-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-119-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-121-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/2040-123-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Order Specifications.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\International\Geo\Nation Order Specifications.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
Processes:
Order Specifications.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Specifications.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Order Specifications.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Order Specifications.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Order Specifications.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Specifications.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Order Specifications.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Order Specifications.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Specifications.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Order Specifications.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Specifications.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Specifications.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Specifications.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Specifications.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Specifications.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Specifications.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Order Specifications.exedescription pid process target process PID 1512 set thread context of 2040 1512 Order Specifications.exe Order Specifications.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Order Specifications.exepid process 2040 Order Specifications.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
Order Specifications.exeOrder Specifications.exepid process 1512 Order Specifications.exe 1512 Order Specifications.exe 1512 Order Specifications.exe 1512 Order Specifications.exe 1512 Order Specifications.exe 1512 Order Specifications.exe 1512 Order Specifications.exe 1512 Order Specifications.exe 1512 Order Specifications.exe 1512 Order Specifications.exe 2040 Order Specifications.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Order Specifications.exeOrder Specifications.exedescription pid process Token: SeDebugPrivilege 1512 Order Specifications.exe Token: SeDebugPrivilege 2040 Order Specifications.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Order Specifications.exepid process 2040 Order Specifications.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Order Specifications.exedescription pid process target process PID 1512 wrote to memory of 1136 1512 Order Specifications.exe Order Specifications.exe PID 1512 wrote to memory of 1136 1512 Order Specifications.exe Order Specifications.exe PID 1512 wrote to memory of 1136 1512 Order Specifications.exe Order Specifications.exe PID 1512 wrote to memory of 1136 1512 Order Specifications.exe Order Specifications.exe PID 1512 wrote to memory of 2040 1512 Order Specifications.exe Order Specifications.exe PID 1512 wrote to memory of 2040 1512 Order Specifications.exe Order Specifications.exe PID 1512 wrote to memory of 2040 1512 Order Specifications.exe Order Specifications.exe PID 1512 wrote to memory of 2040 1512 Order Specifications.exe Order Specifications.exe PID 1512 wrote to memory of 2040 1512 Order Specifications.exe Order Specifications.exe PID 1512 wrote to memory of 2040 1512 Order Specifications.exe Order Specifications.exe PID 1512 wrote to memory of 2040 1512 Order Specifications.exe Order Specifications.exe PID 1512 wrote to memory of 2040 1512 Order Specifications.exe Order Specifications.exe PID 1512 wrote to memory of 2040 1512 Order Specifications.exe Order Specifications.exe -
outlook_office_path 1 IoCs
Processes:
Order Specifications.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Specifications.exe -
outlook_win_path 1 IoCs
Processes:
Order Specifications.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Specifications.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order Specifications.exe"C:\Users\Admin\AppData\Local\Temp\Order Specifications.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\Order Specifications.exe"C:\Users\Admin\AppData\Local\Temp\Order Specifications.exe"2⤵PID:1136
-
-
C:\Users\Admin\AppData\Local\Temp\Order Specifications.exe"C:\Users\Admin\AppData\Local\Temp\Order Specifications.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2040
-