Analysis
-
max time kernel
111s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-05-2022 01:07
Static task
static1
Behavioral task
behavioral1
Sample
kesh.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
kesh.exe
Resource
win10v2004-20220414-en
General
-
Target
kesh.exe
-
Size
1.3MB
-
MD5
aff458f89b918aca8c12c638ce8fece2
-
SHA1
24bddc3fee66de67a6db095ed22033af895e7b41
-
SHA256
3ce259abdca64cabc5ac51d1810ccff6a02fed247f4e65884d4fa4d23f18e086
-
SHA512
ae8c5e8afcfad1359566dee132b24dca1f8e40d3eadac9302075bb326b10ee7e1de25de3f37957dd7c665b2eb3687afd824b35003918b68e4c83fda7d69ada17
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\3B8E3C2477\Log.txt
masslogger
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 31 IoCs
resource yara_rule behavioral1/memory/1092-59-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-60-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-75-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-73-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-77-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-79-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-81-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-83-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-85-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-87-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-89-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-91-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-93-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-95-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-97-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-99-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-101-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-103-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-105-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-107-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-109-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-111-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-113-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-115-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-117-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-119-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-121-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-123-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-125-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-127-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger behavioral1/memory/1092-129-0x0000000001E70000-0x0000000001F22000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Control Panel\International\Geo\Nation kesh.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook kesh.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 kesh.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook kesh.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 kesh.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 kesh.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook kesh.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook kesh.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook kesh.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 kesh.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 kesh.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 kesh.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 kesh.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 kesh.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook kesh.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 kesh.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1976 set thread context of 1092 1976 kesh.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1976 kesh.exe 1092 kesh.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1976 kesh.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1092 kesh.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1976 wrote to memory of 880 1976 kesh.exe 28 PID 1976 wrote to memory of 880 1976 kesh.exe 28 PID 1976 wrote to memory of 880 1976 kesh.exe 28 PID 1976 wrote to memory of 880 1976 kesh.exe 28 PID 1976 wrote to memory of 880 1976 kesh.exe 28 PID 1976 wrote to memory of 880 1976 kesh.exe 28 PID 1976 wrote to memory of 1092 1976 kesh.exe 29 PID 1976 wrote to memory of 1092 1976 kesh.exe 29 PID 1976 wrote to memory of 1092 1976 kesh.exe 29 PID 1976 wrote to memory of 1092 1976 kesh.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 kesh.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 kesh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\kesh.exe"C:\Users\Admin\AppData\Local\Temp\kesh.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\kesh.exe"C:\Users\Admin\AppData\Local\Temp\kesh.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1092
-