Analysis
-
max time kernel
98s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 18:55
Static task
static1
Behavioral task
behavioral1
Sample
RFQ NO. 4400008663.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
RFQ NO. 4400008663.exe
Resource
win10v2004-20220414-en
General
-
Target
RFQ NO. 4400008663.exe
-
Size
720KB
-
MD5
dc26f87b2a4b65908a89673d1a4bf4d3
-
SHA1
fe9c81cafac65c5b78a8b6fd629f7d69ed1f2f05
-
SHA256
ff6459ca52183c69be1ef1764b9a1cd4c3436d2713483bf5ad219d2bff0d439e
-
SHA512
3218d19985bd0c4cde21f1bf06d881016e9471c1e9ebe935709e3c493d3c9517a5232d8791152195aff7ab81182efe0434c824b85e364e30a5ffa6a519851b6b
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 32 IoCs
resource yara_rule behavioral1/memory/1924-64-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-63-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-66-0x00000000004A15EE-mapping.dmp family_masslogger behavioral1/memory/1924-65-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-70-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-68-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-72-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-74-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-76-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-78-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-80-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-82-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-84-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-86-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-88-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-90-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-92-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-96-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-98-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-94-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-104-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-102-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-100-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-106-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-108-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-114-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-112-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-110-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-116-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-118-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-120-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger behavioral1/memory/1924-122-0x0000000000400000-0x00000000004A6000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Control Panel\International\Geo\Nation RFQ NO. 4400008663.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ NO. 4400008663.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ NO. 4400008663.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ NO. 4400008663.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook RFQ NO. 4400008663.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook RFQ NO. 4400008663.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ NO. 4400008663.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ NO. 4400008663.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ NO. 4400008663.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ NO. 4400008663.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook RFQ NO. 4400008663.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ NO. 4400008663.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RFQ NO. 4400008663.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RFQ NO. 4400008663.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook RFQ NO. 4400008663.exe Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ NO. 4400008663.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1708 set thread context of 1924 1708 RFQ NO. 4400008663.exe 28 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1924 RFQ NO. 4400008663.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1708 RFQ NO. 4400008663.exe 1708 RFQ NO. 4400008663.exe 1708 RFQ NO. 4400008663.exe 1708 RFQ NO. 4400008663.exe 1708 RFQ NO. 4400008663.exe 1708 RFQ NO. 4400008663.exe 1708 RFQ NO. 4400008663.exe 1708 RFQ NO. 4400008663.exe 1924 RFQ NO. 4400008663.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1708 RFQ NO. 4400008663.exe Token: SeDebugPrivilege 1924 RFQ NO. 4400008663.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1924 RFQ NO. 4400008663.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1924 1708 RFQ NO. 4400008663.exe 28 PID 1708 wrote to memory of 1924 1708 RFQ NO. 4400008663.exe 28 PID 1708 wrote to memory of 1924 1708 RFQ NO. 4400008663.exe 28 PID 1708 wrote to memory of 1924 1708 RFQ NO. 4400008663.exe 28 PID 1708 wrote to memory of 1924 1708 RFQ NO. 4400008663.exe 28 PID 1708 wrote to memory of 1924 1708 RFQ NO. 4400008663.exe 28 PID 1708 wrote to memory of 1924 1708 RFQ NO. 4400008663.exe 28 PID 1708 wrote to memory of 1924 1708 RFQ NO. 4400008663.exe 28 PID 1708 wrote to memory of 1924 1708 RFQ NO. 4400008663.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ NO. 4400008663.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ NO. 4400008663.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ NO. 4400008663.exe"C:\Users\Admin\AppData\Local\Temp\RFQ NO. 4400008663.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\RFQ NO. 4400008663.exe"C:\Users\Admin\AppData\Local\Temp\RFQ NO. 4400008663.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1924
-