Analysis
-
max time kernel
98s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 01:28
Static task
static1
Behavioral task
behavioral1
Sample
new order xls.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
new order xls.exe
Resource
win10v2004-20220414-en
General
-
Target
new order xls.exe
-
Size
1.8MB
-
MD5
60826b549c1baaa5f34d192d54aa91f2
-
SHA1
9650ab46ee8f654c260e712b2d3b0443a5ca1d7c
-
SHA256
25713dac1c6cb3444ccdb4439510b4e396fd217fcd6a5d1c3d40b48ae2716616
-
SHA512
3b124114ee2c8ee28386b201eb0e8b8411731d5f3dd19530443d4a5e8891e90d59e95e05218f3043f3364598abb7cc18fe2fc1dd483c00c21a42f0368b200e79
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Costura\8E3603ED8A0381E02887C1DBBE921340\32\sqlite.interop.dll acprotect -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Costura\8E3603ED8A0381E02887C1DBBE921340\32\sqlite.interop.dll upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
new order xls.exenew order xls.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation new order xls.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation new order xls.exe -
Loads dropped DLL 1 IoCs
Processes:
new order xls.exepid process 1052 new order xls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 18 IoCs
Processes:
new order xls.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook new order xls.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook new order xls.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order xls.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order xls.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order xls.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order xls.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order xls.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order xls.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order xls.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook new order xls.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order xls.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order xls.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order xls.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order xls.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook new order xls.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order xls.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook new order xls.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook new order xls.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 48 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
new order xls.exedescription pid process target process PID 1884 set thread context of 1052 1884 new order xls.exe new order xls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
new order xls.exepid process 1052 new order xls.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
new order xls.exenew order xls.exepid process 1884 new order xls.exe 1884 new order xls.exe 1884 new order xls.exe 1884 new order xls.exe 1884 new order xls.exe 1052 new order xls.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
new order xls.exenew order xls.exedescription pid process Token: SeDebugPrivilege 1884 new order xls.exe Token: SeDebugPrivilege 1052 new order xls.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
new order xls.exepid process 1052 new order xls.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
new order xls.exedescription pid process target process PID 1884 wrote to memory of 2852 1884 new order xls.exe schtasks.exe PID 1884 wrote to memory of 2852 1884 new order xls.exe schtasks.exe PID 1884 wrote to memory of 2852 1884 new order xls.exe schtasks.exe PID 1884 wrote to memory of 3716 1884 new order xls.exe new order xls.exe PID 1884 wrote to memory of 3716 1884 new order xls.exe new order xls.exe PID 1884 wrote to memory of 3716 1884 new order xls.exe new order xls.exe PID 1884 wrote to memory of 1052 1884 new order xls.exe new order xls.exe PID 1884 wrote to memory of 1052 1884 new order xls.exe new order xls.exe PID 1884 wrote to memory of 1052 1884 new order xls.exe new order xls.exe PID 1884 wrote to memory of 1052 1884 new order xls.exe new order xls.exe PID 1884 wrote to memory of 1052 1884 new order xls.exe new order xls.exe PID 1884 wrote to memory of 1052 1884 new order xls.exe new order xls.exe PID 1884 wrote to memory of 1052 1884 new order xls.exe new order xls.exe PID 1884 wrote to memory of 1052 1884 new order xls.exe new order xls.exe -
outlook_office_path 1 IoCs
Processes:
new order xls.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order xls.exe -
outlook_win_path 1 IoCs
Processes:
new order xls.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 new order xls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\new order xls.exe"C:\Users\Admin\AppData\Local\Temp\new order xls.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\daKLyFIBQOA" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4A67.tmp"2⤵
- Creates scheduled task(s)
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\new order xls.exe"{path}"2⤵PID:3716
-
-
C:\Users\Admin\AppData\Local\Temp\new order xls.exe"{path}"2⤵
- Checks computer location settings
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1052
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5400f1cc1a0a0ce1cdabda365ab3368ce
SHA11ecf683f14271d84f3b6063493dce00ff5f42075
SHA256c8fa64f4b69df13ed6408fd4a204f318a36c2f38c85d4a4d42adfc9173f73765
SHA51214c8cfd58d097e5e89c8cabe1e665173f1ccf604a9ef70cdcb84116e265f90819c19c891be408e0ad7e29086a5c2ea2883b7a7d1184878dbbac63e2cabcd1c45
-
Filesize
594KB
MD5e81aeac387c5db32b7f9b07d15e788e0
SHA1829be6eaf1cb0d82b2ddfc98272e1087f4a7a7c3
SHA25644f31f99f048bfc5195937353b5207332e455bcd5a722bcfd32cacfd93f60f06
SHA512cc6a96325a01c50c059706a1f4156f109e502ef9c0b0f5de209d1f52e7cc973cebc027f57ed988e9d1b8fca62746b60ee7430d608de95cdd0e5ac3cb61fbe32e
-
Filesize
1KB
MD550db8286f4adf08ba817fdf8ed48427b
SHA1736ba813be613f777e0d00d7d491bd7cabe6732d
SHA25672ca5b623a3ea0c6a219647ccdf85120767c5ccaea9733360640534a074e9977
SHA512be9d1cbac1a8e2dc2ef498540178e2b24f1c160140998a1cb76ca0eb853454bce93d2a98f0b239c0cd81eaf994a99e9eeadd7bc068c580674ec25d5d8537e406