Analysis
-
max time kernel
130s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 01:33
Static task
static1
Behavioral task
behavioral1
Sample
Product-7783887.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Product-7783887.exe
Resource
win10v2004-20220414-en
General
-
Target
Product-7783887.exe
-
Size
880KB
-
MD5
f35fc88f11874e02e90bb0aa88e2fccf
-
SHA1
0aa0f21d88688af2e38bf574a18c97f9939b6b42
-
SHA256
235bae9ae04ff1860775c42e55671d3bb84d5abdf4f0f0267c66c46050f8aaca
-
SHA512
e4bc231916f44dd6cd8785a741537ebe364e0d4656b57977046df2e4f1deb8b236c46abe6b8549102755b64cc653e6e5d61a3600965c9c3ac2cb88736400d0be
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\F95B724EDE\Log.txt
masslogger
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4236-140-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Product-7783887.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation Product-7783887.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 18 IoCs
Processes:
Product-7783887.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook Product-7783887.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Product-7783887.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook Product-7783887.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook Product-7783887.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook Product-7783887.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Product-7783887.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 42 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Product-7783887.exedescription pid process target process PID 4888 set thread context of 4236 4888 Product-7783887.exe Product-7783887.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Product-7783887.exepid process 4236 Product-7783887.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
Product-7783887.exeProduct-7783887.exepowershell.exepid process 4888 Product-7783887.exe 4888 Product-7783887.exe 4888 Product-7783887.exe 4888 Product-7783887.exe 4236 Product-7783887.exe 4236 Product-7783887.exe 5024 powershell.exe 5024 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Product-7783887.exeProduct-7783887.exepowershell.exedescription pid process Token: SeDebugPrivilege 4888 Product-7783887.exe Token: SeDebugPrivilege 4236 Product-7783887.exe Token: SeDebugPrivilege 5024 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Product-7783887.exepid process 4236 Product-7783887.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
Product-7783887.exeProduct-7783887.execmd.exedescription pid process target process PID 4888 wrote to memory of 4848 4888 Product-7783887.exe Product-7783887.exe PID 4888 wrote to memory of 4848 4888 Product-7783887.exe Product-7783887.exe PID 4888 wrote to memory of 4848 4888 Product-7783887.exe Product-7783887.exe PID 4888 wrote to memory of 2196 4888 Product-7783887.exe Product-7783887.exe PID 4888 wrote to memory of 2196 4888 Product-7783887.exe Product-7783887.exe PID 4888 wrote to memory of 2196 4888 Product-7783887.exe Product-7783887.exe PID 4888 wrote to memory of 4236 4888 Product-7783887.exe Product-7783887.exe PID 4888 wrote to memory of 4236 4888 Product-7783887.exe Product-7783887.exe PID 4888 wrote to memory of 4236 4888 Product-7783887.exe Product-7783887.exe PID 4888 wrote to memory of 4236 4888 Product-7783887.exe Product-7783887.exe PID 4888 wrote to memory of 4236 4888 Product-7783887.exe Product-7783887.exe PID 4888 wrote to memory of 4236 4888 Product-7783887.exe Product-7783887.exe PID 4888 wrote to memory of 4236 4888 Product-7783887.exe Product-7783887.exe PID 4888 wrote to memory of 4236 4888 Product-7783887.exe Product-7783887.exe PID 4236 wrote to memory of 3748 4236 Product-7783887.exe cmd.exe PID 4236 wrote to memory of 3748 4236 Product-7783887.exe cmd.exe PID 4236 wrote to memory of 3748 4236 Product-7783887.exe cmd.exe PID 3748 wrote to memory of 5024 3748 cmd.exe powershell.exe PID 3748 wrote to memory of 5024 3748 cmd.exe powershell.exe PID 3748 wrote to memory of 5024 3748 cmd.exe powershell.exe -
outlook_office_path 1 IoCs
Processes:
Product-7783887.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe -
outlook_win_path 1 IoCs
Processes:
Product-7783887.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Product-7783887.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Product-7783887.exe"C:\Users\Admin\AppData\Local\Temp\Product-7783887.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\Product-7783887.exe"{path}"2⤵PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\Product-7783887.exe"{path}"2⤵PID:2196
-
-
C:\Users\Admin\AppData\Local\Temp\Product-7783887.exe"{path}"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4236 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Product-7783887.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Product-7783887.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58783efc818e6c4b08cdd7dc7e06641d0
SHA1481a410d390aefdd28ff1bc005d1ee46e7b092f2
SHA256735a7e96c6b2d91b062f378d14291656b72c92d36b1a21584ce5b606b4ea8572
SHA5121d48c97192d9ca4deca93a2a62dc6230d2752b1710c95660b41e89413b9b022a0139570d946580968bd04cf48497a6dc31e25d4aca7f477525b346ab0a302d32