Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    43s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21/05/2022, 11:01 UTC

General

  • Target

    Purchase Order.exe

  • Size

    1.1MB

  • MD5

    0d9f1b254725cd1375c8c2a8b12c7ab2

  • SHA1

    186b7c279999005af4dd955a89461ea77eae6499

  • SHA256

    8353cb4ec041596a1abfeaee6219d8fa495741ee8927674b6a248186de849db9

  • SHA512

    0e5293132e5a59a69e9969dc740cbb6dec33603888ce71ca53520fb2d44de50f45fdef15d4cbc4ffd2acfd1cf018c701fd28938376768ebb570435bb66536daf

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\79FE0CC911\Log.txt

Family

masslogger

Ransom Note
<|| v2.4.0.0 ||> User Name: Admin IP: 154.61.71.51 Location: United States Windows OS: Microsoft Windows 7 Ultimate 64bit Windows Serial Key: D4F6K-QK3RD-TMVMJ-BBMRX-3MBMV CPU: Intel Core Processor (Broadwell) GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/21/2022 11:16:07 AM MassLogger Started: 5/21/2022 11:15:56 AM Interval: 96 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes: <|| WD Exclusion ||> Disabled <|| Binder ||> Disabled <|| Window Searcher ||> Disabled <|| Bot Killer ||> Disabled <|| Downloader ||> Disabled <|| Search And Upload ||> Disabled <|| Telegram Desktop ||> Not Installed <|| Pidgin ||> Not Installed <|| FileZilla ||> Not Installed <|| Discord Tokken ||> Not Installed <|| NordVPN ||> Not Installed <|| Outlook ||> Not Installed <|| FoxMail ||> Not Installed <|| Thunderbird ||> Not Installed <|| FireFox ||> Not Found <|| QQ Browser ||> Not Installed <|| Chromium Recovery ||> Not Installed or Not Found <|| Keylogger And Clipboard ||> Disabled

Signatures

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe
    "C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe
      "C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"
      2⤵
      • Checks computer location settings
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:916

Network

  • flag-us
    DNS
    api.ipify.org
    Purchase Order.exe
    Remote address:
    8.8.8.8:53
    Request
    api.ipify.org
    IN A
    Response
    api.ipify.org
    IN CNAME
    api.ipify.org.herokudns.com
    api.ipify.org.herokudns.com
    IN A
    52.20.78.240
    api.ipify.org.herokudns.com
    IN A
    54.91.59.199
    api.ipify.org.herokudns.com
    IN A
    3.232.242.170
    api.ipify.org.herokudns.com
    IN A
    3.220.57.224
  • flag-us
    DNS
    api.ipify.org
    Purchase Order.exe
    Remote address:
    8.8.8.8:53
    Request
    api.ipify.org
    IN A
    Response
    api.ipify.org
    IN CNAME
    api.ipify.org.herokudns.com
    api.ipify.org.herokudns.com
    IN A
    54.91.59.199
    api.ipify.org.herokudns.com
    IN A
    52.20.78.240
    api.ipify.org.herokudns.com
    IN A
    3.220.57.224
    api.ipify.org.herokudns.com
    IN A
    3.232.242.170
  • flag-us
    GET
    http://api.ipify.org/
    Purchase Order.exe
    Remote address:
    52.20.78.240:80
    Request
    GET / HTTP/1.1
    Host: api.ipify.org
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Server: Cowboy
    Connection: keep-alive
    Content-Type: text/plain
    Vary: Origin
    Date: Sat, 21 May 2022 11:16:05 GMT
    Content-Length: 12
    Via: 1.1 vegur
  • 52.20.78.240:80
    http://api.ipify.org/
    http
    Purchase Order.exe
    345 B
    620 B
    6
    6

    HTTP Request

    GET http://api.ipify.org/

    HTTP Response

    200
  • 8.8.8.8:53
    api.ipify.org
    dns
    Purchase Order.exe
    59 B
    164 B
    1
    1

    DNS Request

    api.ipify.org

    DNS Response

    52.20.78.240
    54.91.59.199
    3.232.242.170
    3.220.57.224

  • 8.8.8.8:53
    api.ipify.org
    dns
    Purchase Order.exe
    59 B
    164 B
    1
    1

    DNS Request

    api.ipify.org

    DNS Response

    54.91.59.199
    52.20.78.240
    3.220.57.224
    3.232.242.170

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/916-57-0x0000000001EF0000-0x0000000001FA8000-memory.dmp

    Filesize

    736KB

  • memory/916-58-0x0000000001EF0000-0x0000000001FA8000-memory.dmp

    Filesize

    736KB

  • memory/916-60-0x0000000004AF0000-0x0000000004B68000-memory.dmp

    Filesize

    480KB

  • memory/916-61-0x0000000004C45000-0x0000000004C56000-memory.dmp

    Filesize

    68KB

  • memory/1624-54-0x0000000075C71000-0x0000000075C73000-memory.dmp

    Filesize

    8KB

  • memory/1624-56-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.