Analysis
-
max time kernel
64s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16-11-2022 02:42
Static task
static1
Behavioral task
behavioral1
Sample
PO6501058115, PO65010581, PO6501058133.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PO6501058115, PO65010581, PO6501058133.exe
Resource
win10v2004-20221111-en
General
-
Target
PO6501058115, PO65010581, PO6501058133.exe
-
Size
1.1MB
-
MD5
01dfe50d975f4480c60858fd4f8602f0
-
SHA1
6e9ef13931e96680201624b7d55b71c1aa2b87f5
-
SHA256
068d065f6cf6f4ece07c2ac083aeac75ef9c2740d4c3204e29535e24222d4c06
-
SHA512
6e2a6620e9ef970350ad1d815bf980575ec3a31d0f984f9a8e15650cc816048e40a914f5f452a12152855cc144309a1c4b19ef800f855c010aca94b0da78c9b2
-
SSDEEP
24576:TVnc4FOBpGtVozfzAXKsponDp8w0bk9kDaTl7L:JnRFCGtVoDaKLF8Lkqcl7L
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main payload 6 IoCs
resource yara_rule behavioral1/memory/2032-63-0x0000000000400000-0x0000000000484000-memory.dmp family_masslogger behavioral1/memory/2032-64-0x0000000000400000-0x0000000000484000-memory.dmp family_masslogger behavioral1/memory/2032-65-0x0000000000400000-0x0000000000484000-memory.dmp family_masslogger behavioral1/memory/2032-66-0x000000000047E1AE-mapping.dmp family_masslogger behavioral1/memory/2032-68-0x0000000000400000-0x0000000000484000-memory.dmp family_masslogger behavioral1/memory/2032-70-0x0000000000400000-0x0000000000484000-memory.dmp family_masslogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation PO6501058115, PO65010581, PO6501058133.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook PO6501058115, PO65010581, PO6501058133.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook PO6501058115, PO65010581, PO6501058133.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook PO6501058115, PO65010581, PO6501058133.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook PO6501058115, PO65010581, PO6501058133.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook PO6501058115, PO65010581, PO6501058133.exe Key queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook PO6501058115, PO65010581, PO6501058133.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook PO6501058115, PO65010581, PO6501058133.exe Key queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook PO6501058115, PO65010581, PO6501058133.exe Key queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook PO6501058115, PO65010581, PO6501058133.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook PO6501058115, PO65010581, PO6501058133.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook PO6501058115, PO65010581, PO6501058133.exe Key queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PO6501058115, PO65010581, PO6501058133.exe Key queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PO6501058115, PO65010581, PO6501058133.exe Key queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook PO6501058115, PO65010581, PO6501058133.exe Key queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe Key queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1208 set thread context of 2032 1208 PO6501058115, PO65010581, PO6501058133.exe 28 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1208 PO6501058115, PO65010581, PO6501058133.exe 2032 PO6501058115, PO65010581, PO6501058133.exe 2032 PO6501058115, PO65010581, PO6501058133.exe 2032 PO6501058115, PO65010581, PO6501058133.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1208 PO6501058115, PO65010581, PO6501058133.exe Token: SeDebugPrivilege 2032 PO6501058115, PO65010581, PO6501058133.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1208 wrote to memory of 2028 1208 PO6501058115, PO65010581, PO6501058133.exe 27 PID 1208 wrote to memory of 2028 1208 PO6501058115, PO65010581, PO6501058133.exe 27 PID 1208 wrote to memory of 2028 1208 PO6501058115, PO65010581, PO6501058133.exe 27 PID 1208 wrote to memory of 2028 1208 PO6501058115, PO65010581, PO6501058133.exe 27 PID 1208 wrote to memory of 2032 1208 PO6501058115, PO65010581, PO6501058133.exe 28 PID 1208 wrote to memory of 2032 1208 PO6501058115, PO65010581, PO6501058133.exe 28 PID 1208 wrote to memory of 2032 1208 PO6501058115, PO65010581, PO6501058133.exe 28 PID 1208 wrote to memory of 2032 1208 PO6501058115, PO65010581, PO6501058133.exe 28 PID 1208 wrote to memory of 2032 1208 PO6501058115, PO65010581, PO6501058133.exe 28 PID 1208 wrote to memory of 2032 1208 PO6501058115, PO65010581, PO6501058133.exe 28 PID 1208 wrote to memory of 2032 1208 PO6501058115, PO65010581, PO6501058133.exe 28 PID 1208 wrote to memory of 2032 1208 PO6501058115, PO65010581, PO6501058133.exe 28 PID 1208 wrote to memory of 2032 1208 PO6501058115, PO65010581, PO6501058133.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO6501058115, PO65010581, PO6501058133.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO6501058115, PO65010581, PO6501058133.exe"C:\Users\Admin\AppData\Local\Temp\PO6501058115, PO65010581, PO6501058133.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\PO6501058115, PO65010581, PO6501058133.exe"C:\Users\Admin\AppData\Local\Temp\PO6501058115, PO65010581, PO6501058133.exe"2⤵PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\PO6501058115, PO65010581, PO6501058133.exe"C:\Users\Admin\AppData\Local\Temp\PO6501058115, PO65010581, PO6501058133.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2032
-