Analysis
-
max time kernel
90s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-06-2022 19:26
Static task
static1
Behavioral task
behavioral1
Sample
REVISE ORDER.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
REVISE ORDER.exe
Resource
win10v2004-20220414-en
General
-
Target
REVISE ORDER.exe
-
Size
804KB
-
MD5
cf41831924a9e271522a59b8cfa7e9bc
-
SHA1
624d9d1ff349e8fddfb93dfb277c3f93d20cd625
-
SHA256
069f0dc72189e7faf5278aabd6ba9f53c386023f9d7d8ab863896e43f6a4e456
-
SHA512
562e01c7c9d935cab4b980407dc8955316bfd3acc61db304ab06df6e37dcccf9d77f0fb5c6907f4dfde751a5b4635879d1a34e7bb119fba0e1e32fd2abb6dedd
Malware Config
Extracted
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
Whyworry90#
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
yara_rule masslogger_log_file -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation REVISE ORDER.exe Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation REVISE ORDER.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 18 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REVISE ORDER.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REVISE ORDER.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook REVISE ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REVISE ORDER.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REVISE ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REVISE ORDER.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REVISE ORDER.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REVISE ORDER.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REVISE ORDER.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook REVISE ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook REVISE ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook REVISE ORDER.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REVISE ORDER.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook REVISE ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook REVISE ORDER.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REVISE ORDER.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REVISE ORDER.exe Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REVISE ORDER.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2600 set thread context of 1796 2600 REVISE ORDER.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3880 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1796 REVISE ORDER.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1796 REVISE ORDER.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1796 REVISE ORDER.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1796 REVISE ORDER.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2600 wrote to memory of 3880 2600 REVISE ORDER.exe 87 PID 2600 wrote to memory of 3880 2600 REVISE ORDER.exe 87 PID 2600 wrote to memory of 3880 2600 REVISE ORDER.exe 87 PID 2600 wrote to memory of 1796 2600 REVISE ORDER.exe 89 PID 2600 wrote to memory of 1796 2600 REVISE ORDER.exe 89 PID 2600 wrote to memory of 1796 2600 REVISE ORDER.exe 89 PID 2600 wrote to memory of 1796 2600 REVISE ORDER.exe 89 PID 2600 wrote to memory of 1796 2600 REVISE ORDER.exe 89 PID 2600 wrote to memory of 1796 2600 REVISE ORDER.exe 89 PID 2600 wrote to memory of 1796 2600 REVISE ORDER.exe 89 PID 2600 wrote to memory of 1796 2600 REVISE ORDER.exe 89 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REVISE ORDER.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 REVISE ORDER.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\REVISE ORDER.exe"C:\Users\Admin\AppData\Local\Temp\REVISE ORDER.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\upwkrGXGpc" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB0C7.tmp"2⤵
- Creates scheduled task(s)
PID:3880
-
-
C:\Users\Admin\AppData\Local\Temp\REVISE ORDER.exe"C:\Users\Admin\AppData\Local\Temp\REVISE ORDER.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1796
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
1KB
MD5fd2f796fbc78c99446e49df186bdb74a
SHA113ef5dd9a9692a4449beffcb5647cb9fb2badfa7
SHA256fca0a362e737a3a2281946da019edda0caf8ebfdab5a3154e3eab356ca9e9dd1
SHA5120d5da761b7d6fc27516c2040e55951e383cc1de67534d6f75e3d281874f1d7be1c50bef61b3380f6622ff8f7362a1aa96c9fa6ff1c3ba361bfc391a531215e01