Analysis
-
max time kernel
127s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 12:23
Static task
static1
Behavioral task
behavioral1
Sample
Payment Copy.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Payment Copy.exe
Resource
win10v2004-20220414-en
General
-
Target
Payment Copy.exe
-
Size
764KB
-
MD5
c42d141d2a0104b7b725a26fa811da2f
-
SHA1
e0f42094eaabffd36242cc74bf6da042d7d89dc8
-
SHA256
77105623676f77a5ecc6c88d65d0c23793969b03b45d4d24dc11ac706552e504
-
SHA512
ce4226c66103ebce5025616c45ad02e4037f9e00636663dc5c3eccc14bc2128d8de063ea5d8e8cd94d5d359fab364eeade003895a2012f121916524519766e05
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 32 IoCs
Processes:
resource yara_rule behavioral1/memory/1088-63-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-64-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-65-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-66-0x00000000004A15EE-mapping.dmp family_masslogger behavioral1/memory/1088-68-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-70-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-72-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-74-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-76-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-78-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-80-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-82-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-84-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-86-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-88-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-90-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-92-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-94-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-96-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-98-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-100-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-102-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-104-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-106-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-108-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-110-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-112-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-114-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-116-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-118-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-120-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1088-122-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Payment Copy.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Control Panel\International\Geo\Nation Payment Copy.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
Processes:
Payment Copy.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Copy.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Payment Copy.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Payment Copy.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Copy.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Copy.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Copy.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Payment Copy.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Copy.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Copy.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Payment Copy.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Copy.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Payment Copy.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Copy.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Copy.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Payment Copy.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Payment Copy.exedescription pid process target process PID 948 set thread context of 1088 948 Payment Copy.exe Payment Copy.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Payment Copy.exepid process 1088 Payment Copy.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
Payment Copy.exePayment Copy.exepid process 948 Payment Copy.exe 948 Payment Copy.exe 948 Payment Copy.exe 948 Payment Copy.exe 948 Payment Copy.exe 948 Payment Copy.exe 948 Payment Copy.exe 948 Payment Copy.exe 1088 Payment Copy.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Payment Copy.exePayment Copy.exedescription pid process Token: SeDebugPrivilege 948 Payment Copy.exe Token: SeDebugPrivilege 1088 Payment Copy.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Payment Copy.exepid process 1088 Payment Copy.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Payment Copy.exedescription pid process target process PID 948 wrote to memory of 1088 948 Payment Copy.exe Payment Copy.exe PID 948 wrote to memory of 1088 948 Payment Copy.exe Payment Copy.exe PID 948 wrote to memory of 1088 948 Payment Copy.exe Payment Copy.exe PID 948 wrote to memory of 1088 948 Payment Copy.exe Payment Copy.exe PID 948 wrote to memory of 1088 948 Payment Copy.exe Payment Copy.exe PID 948 wrote to memory of 1088 948 Payment Copy.exe Payment Copy.exe PID 948 wrote to memory of 1088 948 Payment Copy.exe Payment Copy.exe PID 948 wrote to memory of 1088 948 Payment Copy.exe Payment Copy.exe PID 948 wrote to memory of 1088 948 Payment Copy.exe Payment Copy.exe -
outlook_office_path 1 IoCs
Processes:
Payment Copy.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Copy.exe -
outlook_win_path 1 IoCs
Processes:
Payment Copy.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Payment Copy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Copy.exe"C:\Users\Admin\AppData\Local\Temp\Payment Copy.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\Payment Copy.exe"C:\Users\Admin\AppData\Local\Temp\Payment Copy.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1088
-