Analysis
-
max time kernel
130s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 02:02
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PURCHASE.exe
Resource
win10v2004-20220414-en
General
-
Target
PURCHASE.exe
-
Size
1.7MB
-
MD5
692a0e33a1f8159a91020ff78a91fd0f
-
SHA1
e609fdef9d33611113fe311276d6584a0d3e221c
-
SHA256
dbdbfa24b62d54b1624dac7d07bd939677342c820867b0d8993f0ab95af3d342
-
SHA512
1bc350b7aee9c53d116ea2dc41e04dce24bae01b2a0a41fa56457d42a5164e76b7debdf6be9670f83a87b3922f85d4548ebbbcc655e03ed7a344a212135eeb72
Malware Config
Extracted
Protocol: smtp- Host:
smtp.flockmail.com - Port:
587 - Username:
[email protected] - Password:
Fraudoo7
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\Costura\8E3603ED8A0381E02887C1DBBE921340\32\sqlite.interop.dll acprotect -
ReZer0 packer 1 IoCs
Detects ReZer0, a packer with multiple versions used in various campaigns.
Processes:
resource yara_rule behavioral1/memory/1992-57-0x000000000A260000-0x000000000A3C6000-memory.dmp rezer0 -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\Costura\8E3603ED8A0381E02887C1DBBE921340\32\sqlite.interop.dll upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
PURCHASE.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Control Panel\International\Geo\Nation PURCHASE.exe -
Loads dropped DLL 1 IoCs
Processes:
PURCHASE.exepid process 1660 PURCHASE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
Processes:
PURCHASE.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook PURCHASE.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PURCHASE.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PURCHASE.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PURCHASE.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook PURCHASE.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PURCHASE.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook PURCHASE.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook PURCHASE.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PURCHASE.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PURCHASE.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PURCHASE.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PURCHASE.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PURCHASE.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PURCHASE.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PURCHASE.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PURCHASE.exedescription pid process target process PID 1992 set thread context of 1660 1992 PURCHASE.exe PURCHASE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
PURCHASE.exepid process 1660 PURCHASE.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
PURCHASE.exepid process 1660 PURCHASE.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
PURCHASE.exePURCHASE.exedescription pid process Token: SeDebugPrivilege 1992 PURCHASE.exe Token: SeDebugPrivilege 1660 PURCHASE.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
PURCHASE.exepid process 1660 PURCHASE.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
PURCHASE.exedescription pid process target process PID 1992 wrote to memory of 1700 1992 PURCHASE.exe schtasks.exe PID 1992 wrote to memory of 1700 1992 PURCHASE.exe schtasks.exe PID 1992 wrote to memory of 1700 1992 PURCHASE.exe schtasks.exe PID 1992 wrote to memory of 1700 1992 PURCHASE.exe schtasks.exe PID 1992 wrote to memory of 1660 1992 PURCHASE.exe PURCHASE.exe PID 1992 wrote to memory of 1660 1992 PURCHASE.exe PURCHASE.exe PID 1992 wrote to memory of 1660 1992 PURCHASE.exe PURCHASE.exe PID 1992 wrote to memory of 1660 1992 PURCHASE.exe PURCHASE.exe PID 1992 wrote to memory of 1660 1992 PURCHASE.exe PURCHASE.exe PID 1992 wrote to memory of 1660 1992 PURCHASE.exe PURCHASE.exe PID 1992 wrote to memory of 1660 1992 PURCHASE.exe PURCHASE.exe PID 1992 wrote to memory of 1660 1992 PURCHASE.exe PURCHASE.exe PID 1992 wrote to memory of 1660 1992 PURCHASE.exe PURCHASE.exe -
outlook_office_path 1 IoCs
Processes:
PURCHASE.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PURCHASE.exe -
outlook_win_path 1 IoCs
Processes:
PURCHASE.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PURCHASE.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PURCHASE.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UTZEtCS" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3D8.tmp"2⤵
- Creates scheduled task(s)
PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\PURCHASE.exe"{path}"2⤵
- Checks computer location settings
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1660
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d35735e2f2c4449eeeca3d4fb9254702
SHA1a52b2a0d2a2451742ca0a008eef0f4b867ba6bc2
SHA2564e2b9d28fd20df815c5dbe2f5aef8fc19fcc843b17fe72f3dfa32e9cdeff0f64
SHA512c0268f5ab9323d3ca970efe8b7ac5f15291b1930bb1f5ee9507a1a501c1ab8c77b7847584366fb37ae0709dc086d6aec3fc140f3767a897e4e0f2167b5b466dd
-
Filesize
594KB
MD5e81aeac387c5db32b7f9b07d15e788e0
SHA1829be6eaf1cb0d82b2ddfc98272e1087f4a7a7c3
SHA25644f31f99f048bfc5195937353b5207332e455bcd5a722bcfd32cacfd93f60f06
SHA512cc6a96325a01c50c059706a1f4156f109e502ef9c0b0f5de209d1f52e7cc973cebc027f57ed988e9d1b8fca62746b60ee7430d608de95cdd0e5ac3cb61fbe32e