Analysis
-
max time kernel
94s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 01:33
Static task
static1
Behavioral task
behavioral1
Sample
Product-7783887.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Product-7783887.exe
Resource
win10v2004-20220414-en
General
-
Target
Product-7783887.exe
-
Size
880KB
-
MD5
f35fc88f11874e02e90bb0aa88e2fccf
-
SHA1
0aa0f21d88688af2e38bf574a18c97f9939b6b42
-
SHA256
235bae9ae04ff1860775c42e55671d3bb84d5abdf4f0f0267c66c46050f8aaca
-
SHA512
e4bc231916f44dd6cd8785a741537ebe364e0d4656b57977046df2e4f1deb8b236c46abe6b8549102755b64cc653e6e5d61a3600965c9c3ac2cb88736400d0be
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\AEF946DCB4\Log.txt
masslogger
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/956-61-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/956-62-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/956-63-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/956-64-0x00000000004A2D0E-mapping.dmp family_masslogger behavioral1/memory/956-66-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/956-68-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Product-7783887.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Control Panel\International\Geo\Nation Product-7783887.exe -
Deletes itself 1 IoCs
Processes:
powershell.exepid process 1760 powershell.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
Processes:
Product-7783887.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Product-7783887.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Product-7783887.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Product-7783887.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Product-7783887.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Product-7783887.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Product-7783887.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Product-7783887.exedescription pid process target process PID 1672 set thread context of 956 1672 Product-7783887.exe Product-7783887.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Product-7783887.exepid process 956 Product-7783887.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Product-7783887.exepowershell.exepid process 956 Product-7783887.exe 956 Product-7783887.exe 1760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Product-7783887.exepowershell.exedescription pid process Token: SeDebugPrivilege 956 Product-7783887.exe Token: SeDebugPrivilege 1760 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Product-7783887.exepid process 956 Product-7783887.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
Product-7783887.exeProduct-7783887.execmd.exedescription pid process target process PID 1672 wrote to memory of 956 1672 Product-7783887.exe Product-7783887.exe PID 1672 wrote to memory of 956 1672 Product-7783887.exe Product-7783887.exe PID 1672 wrote to memory of 956 1672 Product-7783887.exe Product-7783887.exe PID 1672 wrote to memory of 956 1672 Product-7783887.exe Product-7783887.exe PID 1672 wrote to memory of 956 1672 Product-7783887.exe Product-7783887.exe PID 1672 wrote to memory of 956 1672 Product-7783887.exe Product-7783887.exe PID 1672 wrote to memory of 956 1672 Product-7783887.exe Product-7783887.exe PID 1672 wrote to memory of 956 1672 Product-7783887.exe Product-7783887.exe PID 1672 wrote to memory of 956 1672 Product-7783887.exe Product-7783887.exe PID 956 wrote to memory of 368 956 Product-7783887.exe cmd.exe PID 956 wrote to memory of 368 956 Product-7783887.exe cmd.exe PID 956 wrote to memory of 368 956 Product-7783887.exe cmd.exe PID 956 wrote to memory of 368 956 Product-7783887.exe cmd.exe PID 368 wrote to memory of 1760 368 cmd.exe powershell.exe PID 368 wrote to memory of 1760 368 cmd.exe powershell.exe PID 368 wrote to memory of 1760 368 cmd.exe powershell.exe PID 368 wrote to memory of 1760 368 cmd.exe powershell.exe -
outlook_office_path 1 IoCs
Processes:
Product-7783887.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe -
outlook_win_path 1 IoCs
Processes:
Product-7783887.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Product-7783887.exe"C:\Users\Admin\AppData\Local\Temp\Product-7783887.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Product-7783887.exe"{path}"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:956 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Product-7783887.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Product-7783887.exe'4⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
-