Analysis
-
max time kernel
82s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 02:37
Static task
static1
Behavioral task
behavioral1
Sample
BANK SLIP.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
BANK SLIP.exe
Resource
win10v2004-20220414-en
General
-
Target
BANK SLIP.exe
-
Size
809KB
-
MD5
20bbb3601fca04cd5c8b094a111805eb
-
SHA1
be8af1891ecdb1d472499374f2c03e9d8f097a43
-
SHA256
bc13ffa3b767641ff58d98c8df48167b55c45fb97335b4819c4af8a57af47ff1
-
SHA512
568968ce44c141e9b4db9b20fff428f62fbedf21bf80d2853347d8a20330f934d23defcc679281221a5660c90849659ae409d1f57f4ef6341cf292e59d794469
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\3B8E3C2477\Log.txt
masslogger
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
BANK SLIP.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Control Panel\International\Geo\Nation BANK SLIP.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
Processes:
BANK SLIP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook BANK SLIP.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BANK SLIP.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook BANK SLIP.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BANK SLIP.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook BANK SLIP.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook BANK SLIP.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BANK SLIP.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BANK SLIP.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BANK SLIP.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BANK SLIP.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook BANK SLIP.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook BANK SLIP.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BANK SLIP.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BANK SLIP.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BANK SLIP.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
BANK SLIP.exedescription pid process target process PID 756 set thread context of 2032 756 BANK SLIP.exe BANK SLIP.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
BANK SLIP.exeBANK SLIP.exepid process 756 BANK SLIP.exe 756 BANK SLIP.exe 2032 BANK SLIP.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
BANK SLIP.exeBANK SLIP.exedescription pid process Token: SeDebugPrivilege 756 BANK SLIP.exe Token: SeDebugPrivilege 2032 BANK SLIP.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
BANK SLIP.exedescription pid process target process PID 756 wrote to memory of 2032 756 BANK SLIP.exe BANK SLIP.exe PID 756 wrote to memory of 2032 756 BANK SLIP.exe BANK SLIP.exe PID 756 wrote to memory of 2032 756 BANK SLIP.exe BANK SLIP.exe PID 756 wrote to memory of 2032 756 BANK SLIP.exe BANK SLIP.exe PID 756 wrote to memory of 2032 756 BANK SLIP.exe BANK SLIP.exe PID 756 wrote to memory of 2032 756 BANK SLIP.exe BANK SLIP.exe PID 756 wrote to memory of 2032 756 BANK SLIP.exe BANK SLIP.exe PID 756 wrote to memory of 2032 756 BANK SLIP.exe BANK SLIP.exe PID 756 wrote to memory of 2032 756 BANK SLIP.exe BANK SLIP.exe -
outlook_office_path 1 IoCs
Processes:
BANK SLIP.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BANK SLIP.exe -
outlook_win_path 1 IoCs
Processes:
BANK SLIP.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BANK SLIP.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BANK SLIP.exe"C:\Users\Admin\AppData\Local\Temp\BANK SLIP.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\BANK SLIP.exe"{path}"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2032
-