Analysis

  • max time kernel
    106s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 03:24

General

  • Target

    ORDER202.exe

  • Size

    941KB

  • MD5

    0a3d357409cb2337a4d533b64b8265cd

  • SHA1

    33cd12b0333af20dcb611b1f42d6a62f8167e90b

  • SHA256

    5f678c283847316bd366cc6a5dcd2b20072271080f493607a03ecd5d26ba65a7

  • SHA512

    8b2f1ad1c8260e2afabf8290d680ee29249fe2edb79d7740b039729f9cc5bbd3231836ac249a206488cb375efe9c3f5979b9b1b7e30e56b19c5692365b67fb64

Malware Config

Signatures

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main Payload 32 IoCs
  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Modifies visibility of file extensions in Explorer 2 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Accesses Microsoft Outlook profiles 1 TTPs 18 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ORDER202.exe
    "C:\Users\Admin\AppData\Local\Temp\ORDER202.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hkEmZYRoabC" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2F3E.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2088
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "{path}"
      2⤵
        PID:2196
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "{path}"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • outlook_office_path
        • outlook_win_path
        PID:4740

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp2F3E.tmp
      Filesize

      1KB

      MD5

      5f3b8012c2dac08869c4241594b55fa2

      SHA1

      d7bb06856c8561fd3d9b93700f877e30634d1002

      SHA256

      17505127dd776ded11e44ce620c99366e897bdcd49a3f27f1ed8214e216dfe80

      SHA512

      0cf4b0474c04641adf32697a9acee849ea54a9872a2b9b805ac11508c3a824896c838833b91fc779f95bbd21dfcc053ee91252938ab5abc2f027af1960b7752c

    • memory/2088-135-0x0000000000000000-mapping.dmp
    • memory/2196-137-0x0000000000000000-mapping.dmp
    • memory/4740-161-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-195-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-639-0x0000000006D60000-0x0000000006DB0000-memory.dmp
      Filesize

      320KB

    • memory/4740-638-0x0000000006040000-0x00000000060A6000-memory.dmp
      Filesize

      408KB

    • memory/4740-201-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-138-0x0000000000000000-mapping.dmp
    • memory/4740-165-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-141-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-143-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-145-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-147-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-149-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-151-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-153-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-155-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-157-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-159-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-167-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-139-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-199-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-197-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-169-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-171-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-173-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-175-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-177-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-179-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-181-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-183-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-185-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-187-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-189-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-191-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-193-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4740-163-0x0000000000400000-0x00000000004A6000-memory.dmp
      Filesize

      664KB

    • memory/4828-130-0x00000000000A0000-0x0000000000192000-memory.dmp
      Filesize

      968KB

    • memory/4828-134-0x0000000009990000-0x0000000009A2C000-memory.dmp
      Filesize

      624KB

    • memory/4828-131-0x0000000007670000-0x0000000007C14000-memory.dmp
      Filesize

      5.6MB

    • memory/4828-132-0x0000000007160000-0x00000000071F2000-memory.dmp
      Filesize

      584KB

    • memory/4828-133-0x0000000007100000-0x000000000710A000-memory.dmp
      Filesize

      40KB