Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
31-05-2022 00:00
Static task
static1
Behavioral task
behavioral1
Sample
DHL BILL OF LADING 62803217763.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
DHL BILL OF LADING 62803217763.exe
Resource
win10v2004-20220414-en
General
-
Target
DHL BILL OF LADING 62803217763.exe
-
Size
736KB
-
MD5
5577d22b593e5d028b779dd76891acf2
-
SHA1
c6ab92abb2f50e484aa672f71f5d04093a21cc2b
-
SHA256
64c4c850be4f8e9a0e12eeeb015c503dd5a2d0f22b8d872678227729bb6db757
-
SHA512
3376f5c418b824343624ef1a38337f63ad49d03f71330a8419a60befdc5c355a5e8e2e862967ef846b8270832f0c6b9504b6620ea985d102ad7ecee83de84834
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\AEF946DCB4\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
[email protected] - Password:
Protected@123
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 32 IoCs
Processes:
resource yara_rule behavioral1/memory/668-77-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-76-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-78-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-79-0x00000000004A218E-mapping.dmp family_masslogger behavioral1/memory/668-82-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-85-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-87-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-89-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-92-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-94-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-96-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-99-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-101-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-103-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-105-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-107-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-110-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-112-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-114-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-116-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-118-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-120-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-122-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-128-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-126-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-132-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-136-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-140-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-138-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-134-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-130-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger behavioral1/memory/668-124-0x0000000000400000-0x00000000004A8000-memory.dmp family_masslogger -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
DHL BILL OF LADING 62803217763.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Control Panel\International\Geo\Nation DHL BILL OF LADING 62803217763.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 15 IoCs
Processes:
DHL BILL OF LADING 62803217763.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DHL BILL OF LADING 62803217763.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook DHL BILL OF LADING 62803217763.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DHL BILL OF LADING 62803217763.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DHL BILL OF LADING 62803217763.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook DHL BILL OF LADING 62803217763.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DHL BILL OF LADING 62803217763.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DHL BILL OF LADING 62803217763.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DHL BILL OF LADING 62803217763.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook DHL BILL OF LADING 62803217763.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DHL BILL OF LADING 62803217763.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DHL BILL OF LADING 62803217763.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook DHL BILL OF LADING 62803217763.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook DHL BILL OF LADING 62803217763.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DHL BILL OF LADING 62803217763.exe Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook DHL BILL OF LADING 62803217763.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
DHL BILL OF LADING 62803217763.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\chrome = "\"C:\\Users\\Admin\\chrome.exe\"" DHL BILL OF LADING 62803217763.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DHL BILL OF LADING 62803217763.exedescription pid process target process PID 316 set thread context of 668 316 DHL BILL OF LADING 62803217763.exe DHL BILL OF LADING 62803217763.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
DHL BILL OF LADING 62803217763.exepid process 668 DHL BILL OF LADING 62803217763.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
DHL BILL OF LADING 62803217763.exeDHL BILL OF LADING 62803217763.exepid process 316 DHL BILL OF LADING 62803217763.exe 316 DHL BILL OF LADING 62803217763.exe 316 DHL BILL OF LADING 62803217763.exe 316 DHL BILL OF LADING 62803217763.exe 316 DHL BILL OF LADING 62803217763.exe 316 DHL BILL OF LADING 62803217763.exe 316 DHL BILL OF LADING 62803217763.exe 316 DHL BILL OF LADING 62803217763.exe 316 DHL BILL OF LADING 62803217763.exe 316 DHL BILL OF LADING 62803217763.exe 316 DHL BILL OF LADING 62803217763.exe 316 DHL BILL OF LADING 62803217763.exe 316 DHL BILL OF LADING 62803217763.exe 668 DHL BILL OF LADING 62803217763.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
DHL BILL OF LADING 62803217763.exeDHL BILL OF LADING 62803217763.exedescription pid process Token: SeDebugPrivilege 316 DHL BILL OF LADING 62803217763.exe Token: SeDebugPrivilege 668 DHL BILL OF LADING 62803217763.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
DHL BILL OF LADING 62803217763.exepid process 668 DHL BILL OF LADING 62803217763.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
DHL BILL OF LADING 62803217763.exedescription pid process target process PID 316 wrote to memory of 668 316 DHL BILL OF LADING 62803217763.exe DHL BILL OF LADING 62803217763.exe PID 316 wrote to memory of 668 316 DHL BILL OF LADING 62803217763.exe DHL BILL OF LADING 62803217763.exe PID 316 wrote to memory of 668 316 DHL BILL OF LADING 62803217763.exe DHL BILL OF LADING 62803217763.exe PID 316 wrote to memory of 668 316 DHL BILL OF LADING 62803217763.exe DHL BILL OF LADING 62803217763.exe PID 316 wrote to memory of 668 316 DHL BILL OF LADING 62803217763.exe DHL BILL OF LADING 62803217763.exe PID 316 wrote to memory of 668 316 DHL BILL OF LADING 62803217763.exe DHL BILL OF LADING 62803217763.exe PID 316 wrote to memory of 668 316 DHL BILL OF LADING 62803217763.exe DHL BILL OF LADING 62803217763.exe PID 316 wrote to memory of 668 316 DHL BILL OF LADING 62803217763.exe DHL BILL OF LADING 62803217763.exe PID 316 wrote to memory of 668 316 DHL BILL OF LADING 62803217763.exe DHL BILL OF LADING 62803217763.exe -
outlook_office_path 1 IoCs
Processes:
DHL BILL OF LADING 62803217763.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DHL BILL OF LADING 62803217763.exe -
outlook_win_path 1 IoCs
Processes:
DHL BILL OF LADING 62803217763.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DHL BILL OF LADING 62803217763.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL BILL OF LADING 62803217763.exe"C:\Users\Admin\AppData\Local\Temp\DHL BILL OF LADING 62803217763.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\DHL BILL OF LADING 62803217763.exe"C:\Users\Admin\AppData\Local\Temp\DHL BILL OF LADING 62803217763.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:668