Analysis
-
max time kernel
109s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 12:00
Static task
static1
Behavioral task
behavioral1
Sample
payment.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
payment.exe
Resource
win10v2004-20220414-en
General
-
Target
payment.exe
-
Size
824KB
-
MD5
4da9b1c872a6f439f021f1de649fef0b
-
SHA1
99e749fb6f278bd3a11aef9061231a60d4d5076e
-
SHA256
22affc52b0adbdbe156a2f9033829ff188ed56e472db2b545a1c8913641894fe
-
SHA512
eb8a7f59731316064dcadee08d289d129c2a88d0763709a1f96456308db1487c1566f0a33bcd4c6aac1021363e7b949703d25e32c69eca86581607a5a1113670
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
godswill25
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 33 IoCs
resource yara_rule behavioral1/memory/1312-62-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-63-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-64-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-65-0x00000000004A12CE-mapping.dmp family_masslogger behavioral1/memory/1312-67-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-69-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-71-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-73-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-75-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-77-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-79-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-81-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-83-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-85-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-89-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-87-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-91-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-93-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-95-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-97-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-99-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-101-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-103-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-109-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-107-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-105-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-113-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-111-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-115-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-117-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-119-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-121-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1312-123-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Control Panel\International\Geo\Nation payment.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook payment.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook payment.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook payment.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook payment.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook payment.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook payment.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1788 set thread context of 1312 1788 payment.exe 28 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1312 payment.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1788 payment.exe 1788 payment.exe 1788 payment.exe 1788 payment.exe 1788 payment.exe 1788 payment.exe 1788 payment.exe 1788 payment.exe 1312 payment.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1788 payment.exe Token: SeDebugPrivilege 1312 payment.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1312 payment.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1788 wrote to memory of 1312 1788 payment.exe 28 PID 1788 wrote to memory of 1312 1788 payment.exe 28 PID 1788 wrote to memory of 1312 1788 payment.exe 28 PID 1788 wrote to memory of 1312 1788 payment.exe 28 PID 1788 wrote to memory of 1312 1788 payment.exe 28 PID 1788 wrote to memory of 1312 1788 payment.exe 28 PID 1788 wrote to memory of 1312 1788 payment.exe 28 PID 1788 wrote to memory of 1312 1788 payment.exe 28 PID 1788 wrote to memory of 1312 1788 payment.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 payment.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\payment.exe"C:\Users\Admin\AppData\Local\Temp\payment.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\payment.exe"C:\Users\Admin\AppData\Local\Temp\payment.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1312
-