Analysis
-
max time kernel
107s -
max time network
104s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:24
Static task
static1
Behavioral task
behavioral1
Sample
logo.png
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
logo.png
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
requirements and delivery order.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
requirements and delivery order.exe
Resource
win10v2004-20220414-en
General
-
Target
requirements and delivery order.exe
-
Size
970KB
-
MD5
6085ac87589c9ac7ce7fece0a743d4d3
-
SHA1
d493ca5f57b3a9f8893a287c3ee64e387e30b1fa
-
SHA256
f959039896cdd9c4add867b06af7d100629377c66ef7fb0fd4aeba48f9a9593e
-
SHA512
09ecb1d0b7a70b0b9604f59bdc6ee9ca83560b7e0a815369992c80023a43bbd1ebe7aa199648744290121b042c22c90b3a4cd83da5682eccef48b5a390008546
Malware Config
Extracted
C:\Users\Admin\AppData\Local\8506BBE7FF\Log.txt
masslogger
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 6 IoCs
Processes:
resource yara_rule behavioral3/memory/1088-62-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral3/memory/1088-63-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral3/memory/1088-64-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral3/memory/1088-65-0x00000000004B324E-mapping.dmp family_masslogger behavioral3/memory/1088-67-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral3/memory/1088-69-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
requirements and delivery order.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Control Panel\International\Geo\Nation requirements and delivery order.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
Processes:
requirements and delivery order.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook requirements and delivery order.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook requirements and delivery order.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook requirements and delivery order.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook requirements and delivery order.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook requirements and delivery order.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook requirements and delivery order.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook requirements and delivery order.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook requirements and delivery order.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook requirements and delivery order.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook requirements and delivery order.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook requirements and delivery order.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook requirements and delivery order.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook requirements and delivery order.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook requirements and delivery order.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
requirements and delivery order.exedescription pid process target process PID 1480 set thread context of 1088 1480 requirements and delivery order.exe requirements and delivery order.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
requirements and delivery order.exerequirements and delivery order.exepid process 1480 requirements and delivery order.exe 1480 requirements and delivery order.exe 1088 requirements and delivery order.exe 1088 requirements and delivery order.exe 1088 requirements and delivery order.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
requirements and delivery order.exerequirements and delivery order.exedescription pid process Token: SeDebugPrivilege 1480 requirements and delivery order.exe Token: SeDebugPrivilege 1088 requirements and delivery order.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
requirements and delivery order.exedescription pid process target process PID 1480 wrote to memory of 1088 1480 requirements and delivery order.exe requirements and delivery order.exe PID 1480 wrote to memory of 1088 1480 requirements and delivery order.exe requirements and delivery order.exe PID 1480 wrote to memory of 1088 1480 requirements and delivery order.exe requirements and delivery order.exe PID 1480 wrote to memory of 1088 1480 requirements and delivery order.exe requirements and delivery order.exe PID 1480 wrote to memory of 1088 1480 requirements and delivery order.exe requirements and delivery order.exe PID 1480 wrote to memory of 1088 1480 requirements and delivery order.exe requirements and delivery order.exe PID 1480 wrote to memory of 1088 1480 requirements and delivery order.exe requirements and delivery order.exe PID 1480 wrote to memory of 1088 1480 requirements and delivery order.exe requirements and delivery order.exe PID 1480 wrote to memory of 1088 1480 requirements and delivery order.exe requirements and delivery order.exe -
outlook_office_path 1 IoCs
Processes:
requirements and delivery order.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe -
outlook_win_path 1 IoCs
Processes:
requirements and delivery order.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 requirements and delivery order.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\requirements and delivery order.exe"C:\Users\Admin\AppData\Local\Temp\requirements and delivery order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\requirements and delivery order.exe"{path}"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1088
-