Analysis
-
max time kernel
96s -
max time network
99s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 18:54
Static task
static1
Behavioral task
behavioral1
Sample
Company profile.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Company profile.exe
Resource
win10v2004-20220414-en
General
-
Target
Company profile.exe
-
Size
716KB
-
MD5
16f704634dd7855cf929214dfaeaa9e8
-
SHA1
e7af55b75a431c30265b7a63162611c44cfef296
-
SHA256
e4e29eef439bf36287f9dc660155697cc2d227fbccd34d95a8b59c5451ba5287
-
SHA512
8472440832759e87529151606aecc9cf4696f51c32cf4b9d6b338283bc6c937b0755dd945faa73baf36df1786030042a97883178f0d50db1fa57d160b12761a9
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 32 IoCs
resource yara_rule behavioral1/memory/1692-63-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-64-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-65-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-66-0x00000000004A15EE-mapping.dmp family_masslogger behavioral1/memory/1692-68-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-70-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-72-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-74-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-76-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-78-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-80-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-82-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-84-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-86-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-88-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-90-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-92-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-94-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-96-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-98-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-100-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-102-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-104-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-106-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-108-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-110-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-112-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-114-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-116-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-118-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-120-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1692-122-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\International\Geo\Nation Company profile.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Company profile.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Company profile.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Company profile.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Company profile.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Company profile.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Company profile.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Company profile.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Company profile.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Company profile.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Company profile.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Company profile.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Company profile.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Company profile.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Company profile.exe Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Company profile.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 1692 2040 Company profile.exe 28 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1692 Company profile.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2040 Company profile.exe 2040 Company profile.exe 2040 Company profile.exe 2040 Company profile.exe 2040 Company profile.exe 2040 Company profile.exe 2040 Company profile.exe 2040 Company profile.exe 1692 Company profile.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2040 Company profile.exe Token: SeDebugPrivilege 1692 Company profile.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1692 Company profile.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1692 2040 Company profile.exe 28 PID 2040 wrote to memory of 1692 2040 Company profile.exe 28 PID 2040 wrote to memory of 1692 2040 Company profile.exe 28 PID 2040 wrote to memory of 1692 2040 Company profile.exe 28 PID 2040 wrote to memory of 1692 2040 Company profile.exe 28 PID 2040 wrote to memory of 1692 2040 Company profile.exe 28 PID 2040 wrote to memory of 1692 2040 Company profile.exe 28 PID 2040 wrote to memory of 1692 2040 Company profile.exe 28 PID 2040 wrote to memory of 1692 2040 Company profile.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Company profile.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Company profile.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Company profile.exe"C:\Users\Admin\AppData\Local\Temp\Company profile.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\Company profile.exe"C:\Users\Admin\AppData\Local\Temp\Company profile.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1692
-