Analysis
-
max time kernel
61s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:47
Static task
static1
Behavioral task
behavioral1
Sample
Order 6403 M6aOVZjZ4hixHYB.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Order 6403 M6aOVZjZ4hixHYB.exe
Resource
win10v2004-20220414-en
General
-
Target
Order 6403 M6aOVZjZ4hixHYB.exe
-
Size
889KB
-
MD5
d837dfece70f0905fe0f8cbdedf66923
-
SHA1
c1a7d041d493f77971701744563e3473182319ff
-
SHA256
20bd64b1563fb2fc12b2ace4dd062f8057e7abab76c8a454883aa46a1c97acfd
-
SHA512
13f1fa148d51a0d34272eae8bd6d928975be17a4f1d124445f7c57c17156441da227c0fa2a454c844e5c0f2039dd3fb9b951c225fbffb489c7b6163481af173f
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\8506BBE7FF\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
mail.larosadelmonte.com - Port:
587 - Username:
[email protected] - Password:
CONL082013**
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/1000-57-0x00000000058C0000-0x0000000005978000-memory.dmp rezer0 -
Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
Processes:
RegSvcs.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Order 6403 M6aOVZjZ4hixHYB.exedescription pid process target process PID 1000 set thread context of 1528 1000 Order 6403 M6aOVZjZ4hixHYB.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
RegSvcs.exepid process 1528 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 1528 RegSvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Order 6403 M6aOVZjZ4hixHYB.exedescription pid process target process PID 1000 wrote to memory of 1528 1000 Order 6403 M6aOVZjZ4hixHYB.exe RegSvcs.exe PID 1000 wrote to memory of 1528 1000 Order 6403 M6aOVZjZ4hixHYB.exe RegSvcs.exe PID 1000 wrote to memory of 1528 1000 Order 6403 M6aOVZjZ4hixHYB.exe RegSvcs.exe PID 1000 wrote to memory of 1528 1000 Order 6403 M6aOVZjZ4hixHYB.exe RegSvcs.exe PID 1000 wrote to memory of 1528 1000 Order 6403 M6aOVZjZ4hixHYB.exe RegSvcs.exe PID 1000 wrote to memory of 1528 1000 Order 6403 M6aOVZjZ4hixHYB.exe RegSvcs.exe PID 1000 wrote to memory of 1528 1000 Order 6403 M6aOVZjZ4hixHYB.exe RegSvcs.exe PID 1000 wrote to memory of 1528 1000 Order 6403 M6aOVZjZ4hixHYB.exe RegSvcs.exe PID 1000 wrote to memory of 1528 1000 Order 6403 M6aOVZjZ4hixHYB.exe RegSvcs.exe PID 1000 wrote to memory of 1528 1000 Order 6403 M6aOVZjZ4hixHYB.exe RegSvcs.exe PID 1000 wrote to memory of 1528 1000 Order 6403 M6aOVZjZ4hixHYB.exe RegSvcs.exe PID 1000 wrote to memory of 1528 1000 Order 6403 M6aOVZjZ4hixHYB.exe RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order 6403 M6aOVZjZ4hixHYB.exe"C:\Users\Admin\AppData\Local\Temp\Order 6403 M6aOVZjZ4hixHYB.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1528
-