Analysis
-
max time kernel
58s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 00:57
Static task
static1
Behavioral task
behavioral1
Sample
enquiry20j20endooooo746e66682DIF.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
enquiry20j20endooooo746e66682DIF.exe
Resource
win10v2004-20220414-en
General
-
Target
enquiry20j20endooooo746e66682DIF.exe
-
Size
1.0MB
-
MD5
f819668951d4b48df71db51d6b218299
-
SHA1
0e1704dbb3ce830c3a1e0719b6002419e578a196
-
SHA256
49f037f00bc0861be7b26aa3a1d51e803b5ebe558d801d470783485a58bb799a
-
SHA512
5875bf3377e9ed0cacc04e421b3e7a7f97fe1e810d4d85408ca2a67a9f0fef8ba1e652fa6b3ab9ed04b2e9a01193d5871f4c006ea236d38fb2ba8e30fc8022c1
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\79FE0CC911\Log.txt
masslogger
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
resource yara_rule behavioral1/memory/968-57-0x0000000007FD0000-0x0000000008088000-memory.dmp rezer0 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\International\Geo\Nation enquiry20j20endooooo746e66682DIF.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 968 set thread context of 820 968 enquiry20j20endooooo746e66682DIF.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 816 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 820 enquiry20j20endooooo746e66682DIF.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 820 enquiry20j20endooooo746e66682DIF.exe 820 enquiry20j20endooooo746e66682DIF.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 968 enquiry20j20endooooo746e66682DIF.exe Token: SeDebugPrivilege 820 enquiry20j20endooooo746e66682DIF.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 820 enquiry20j20endooooo746e66682DIF.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 968 wrote to memory of 816 968 enquiry20j20endooooo746e66682DIF.exe 28 PID 968 wrote to memory of 816 968 enquiry20j20endooooo746e66682DIF.exe 28 PID 968 wrote to memory of 816 968 enquiry20j20endooooo746e66682DIF.exe 28 PID 968 wrote to memory of 816 968 enquiry20j20endooooo746e66682DIF.exe 28 PID 968 wrote to memory of 820 968 enquiry20j20endooooo746e66682DIF.exe 30 PID 968 wrote to memory of 820 968 enquiry20j20endooooo746e66682DIF.exe 30 PID 968 wrote to memory of 820 968 enquiry20j20endooooo746e66682DIF.exe 30 PID 968 wrote to memory of 820 968 enquiry20j20endooooo746e66682DIF.exe 30 PID 968 wrote to memory of 820 968 enquiry20j20endooooo746e66682DIF.exe 30 PID 968 wrote to memory of 820 968 enquiry20j20endooooo746e66682DIF.exe 30 PID 968 wrote to memory of 820 968 enquiry20j20endooooo746e66682DIF.exe 30 PID 968 wrote to memory of 820 968 enquiry20j20endooooo746e66682DIF.exe 30 PID 968 wrote to memory of 820 968 enquiry20j20endooooo746e66682DIF.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\enquiry20j20endooooo746e66682DIF.exe"C:\Users\Admin\AppData\Local\Temp\enquiry20j20endooooo746e66682DIF.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vpwFiobjtAs" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7791.tmp"2⤵
- Creates scheduled task(s)
PID:816
-
-
C:\Users\Admin\AppData\Local\Temp\enquiry20j20endooooo746e66682DIF.exe"{path}"2⤵
- Checks computer location settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:820
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55ed839f774941e220ff540029d22bb3c
SHA194e0628f6e5dba767a828e289f676c472e7d9905
SHA2560f45d4aca1c11748c61b7ec3705d02bbcdfc65c1054369e142c63d77fa98ebea
SHA51290b9fa135ba800694d0fd070efa4b650fec441af465c565eb34d0e04dc216a12f3d48e22511edc150a96f05b848794c7ec4f8b416c4bedda3c2463aa81993a15