Analysis
-
max time kernel
79s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 18:52
Static task
static1
Behavioral task
behavioral1
Sample
Order Inquiry List.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Order Inquiry List.exe
Resource
win10v2004-20220414-en
General
-
Target
Order Inquiry List.exe
-
Size
1.2MB
-
MD5
4c812fc87fce65e0cb5011a55b453200
-
SHA1
6a92d646c4858b718b10bbd2a5a41faab41a25a9
-
SHA256
ea23ee7d6471b33c86c5eac4f96c09f060aaf5fcb7847b4ebc386a16871ee64c
-
SHA512
32360dbfc573335d91f8b5a67dce3830ee72614d342ff4b717924393af3bbc0d0e0d009d4baec786fadaf3c5d6e2782b1fc01368b96a4344803b1943222c1ba9
Malware Config
Extracted
C:\Users\Admin\AppData\Local\AEF946DCB4\Log.txt
masslogger
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 6 IoCs
resource yara_rule behavioral1/memory/2012-62-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral1/memory/2012-63-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral1/memory/2012-65-0x00000000004B34AE-mapping.dmp family_masslogger behavioral1/memory/2012-64-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral1/memory/2012-67-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral1/memory/2012-69-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Control Panel\International\Geo\Nation Order Inquiry List.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Order Inquiry List.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Order Inquiry List.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook Order Inquiry List.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook Order Inquiry List.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Order Inquiry List.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Order Inquiry List.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook Order Inquiry List.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook Order Inquiry List.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Order Inquiry List.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook Order Inquiry List.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Order Inquiry List.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook Order Inquiry List.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook Order Inquiry List.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook Order Inquiry List.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1960 set thread context of 2012 1960 Order Inquiry List.exe 31 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2012 Order Inquiry List.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1960 Order Inquiry List.exe 1960 Order Inquiry List.exe 1960 Order Inquiry List.exe 1960 Order Inquiry List.exe 2012 Order Inquiry List.exe 2012 Order Inquiry List.exe 2012 Order Inquiry List.exe 2012 Order Inquiry List.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1960 Order Inquiry List.exe Token: SeDebugPrivilege 2012 Order Inquiry List.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2012 Order Inquiry List.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1264 1960 Order Inquiry List.exe 27 PID 1960 wrote to memory of 1264 1960 Order Inquiry List.exe 27 PID 1960 wrote to memory of 1264 1960 Order Inquiry List.exe 27 PID 1960 wrote to memory of 1264 1960 Order Inquiry List.exe 27 PID 1960 wrote to memory of 2000 1960 Order Inquiry List.exe 28 PID 1960 wrote to memory of 2000 1960 Order Inquiry List.exe 28 PID 1960 wrote to memory of 2000 1960 Order Inquiry List.exe 28 PID 1960 wrote to memory of 2000 1960 Order Inquiry List.exe 28 PID 1960 wrote to memory of 1828 1960 Order Inquiry List.exe 29 PID 1960 wrote to memory of 1828 1960 Order Inquiry List.exe 29 PID 1960 wrote to memory of 1828 1960 Order Inquiry List.exe 29 PID 1960 wrote to memory of 1828 1960 Order Inquiry List.exe 29 PID 1960 wrote to memory of 2028 1960 Order Inquiry List.exe 30 PID 1960 wrote to memory of 2028 1960 Order Inquiry List.exe 30 PID 1960 wrote to memory of 2028 1960 Order Inquiry List.exe 30 PID 1960 wrote to memory of 2028 1960 Order Inquiry List.exe 30 PID 1960 wrote to memory of 2012 1960 Order Inquiry List.exe 31 PID 1960 wrote to memory of 2012 1960 Order Inquiry List.exe 31 PID 1960 wrote to memory of 2012 1960 Order Inquiry List.exe 31 PID 1960 wrote to memory of 2012 1960 Order Inquiry List.exe 31 PID 1960 wrote to memory of 2012 1960 Order Inquiry List.exe 31 PID 1960 wrote to memory of 2012 1960 Order Inquiry List.exe 31 PID 1960 wrote to memory of 2012 1960 Order Inquiry List.exe 31 PID 1960 wrote to memory of 2012 1960 Order Inquiry List.exe 31 PID 1960 wrote to memory of 2012 1960 Order Inquiry List.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Order Inquiry List.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order Inquiry List.exe"C:\Users\Admin\AppData\Local\Temp\Order Inquiry List.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\Order Inquiry List.exe"C:\Users\Admin\AppData\Local\Temp\Order Inquiry List.exe"2⤵PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\Order Inquiry List.exe"C:\Users\Admin\AppData\Local\Temp\Order Inquiry List.exe"2⤵PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\Order Inquiry List.exe"C:\Users\Admin\AppData\Local\Temp\Order Inquiry List.exe"2⤵PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\Order Inquiry List.exe"C:\Users\Admin\AppData\Local\Temp\Order Inquiry List.exe"2⤵PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\Order Inquiry List.exe"C:\Users\Admin\AppData\Local\Temp\Order Inquiry List.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2012
-