Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-12-2022 12:15
Static task
static1
Behavioral task
behavioral1
Sample
img014012022.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
img014012022.exe
Resource
win10v2004-20221111-en
General
-
Target
img014012022.exe
-
Size
667KB
-
MD5
0d8c9a1bf7c59fc5623bc97992c84d68
-
SHA1
f83fd12fc4ba8c891f01f93e4dbec5dd7106cbc3
-
SHA256
f0e3d1d1dd4b0b69a99c24ce4217194e9cbbb4f1efd8edcb8831f6e889c9b5cd
-
SHA512
776d9e66da6c499d54b760f930b7c080be33daabff33e4b9670701f21373f307af602e124ce414b3b354277c5604ae7811105dd9a8d2d8f03571e467947a3d2d
-
SSDEEP
12288:aRW65WWrYINieIUYXPFvWYGegce9pZIdTPxM6uMdmLN4NQ/h1aikvhmF:mW65WWrYIUeIUYXP9WYGegceQN766NKL
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main payload 2 IoCs
resource yara_rule behavioral1/memory/952-67-0x0000000000BB0000-0x0000000000C34000-memory.dmp family_masslogger behavioral1/memory/952-68-0x0000000000400000-0x0000000000494000-memory.dmp family_masslogger -
Executes dropped EXE 2 IoCs
pid Process 308 jjimhzdgo.exe 952 jjimhzdgo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Control Panel\International\Geo\Nation jjimhzdgo.exe -
Loads dropped DLL 3 IoCs
pid Process 1112 img014012022.exe 1112 img014012022.exe 308 jjimhzdgo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook jjimhzdgo.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook jjimhzdgo.exe Key queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook jjimhzdgo.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook jjimhzdgo.exe Key queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook jjimhzdgo.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook jjimhzdgo.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook jjimhzdgo.exe Key queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook jjimhzdgo.exe Key queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook jjimhzdgo.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook jjimhzdgo.exe Key queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook jjimhzdgo.exe Key queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook jjimhzdgo.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe Key queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook jjimhzdgo.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook jjimhzdgo.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 308 set thread context of 952 308 jjimhzdgo.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 952 jjimhzdgo.exe 952 jjimhzdgo.exe 952 jjimhzdgo.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 308 jjimhzdgo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 952 jjimhzdgo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1112 wrote to memory of 308 1112 img014012022.exe 28 PID 1112 wrote to memory of 308 1112 img014012022.exe 28 PID 1112 wrote to memory of 308 1112 img014012022.exe 28 PID 1112 wrote to memory of 308 1112 img014012022.exe 28 PID 308 wrote to memory of 952 308 jjimhzdgo.exe 29 PID 308 wrote to memory of 952 308 jjimhzdgo.exe 29 PID 308 wrote to memory of 952 308 jjimhzdgo.exe 29 PID 308 wrote to memory of 952 308 jjimhzdgo.exe 29 PID 308 wrote to memory of 952 308 jjimhzdgo.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jjimhzdgo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\img014012022.exe"C:\Users\Admin\AppData\Local\Temp\img014012022.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\jjimhzdgo.exe"C:\Users\Admin\AppData\Local\Temp\jjimhzdgo.exe" C:\Users\Admin\AppData\Local\Temp\gjoxrlrsi.k2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Users\Admin\AppData\Local\Temp\jjimhzdgo.exe"C:\Users\Admin\AppData\Local\Temp\jjimhzdgo.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:952
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
577KB
MD5ec34e86bfd01061019a84fe7c04a7bd6
SHA1903985c33ce607533cf6deb19b13aed83bd97e1a
SHA25693ac2fc5a1127495112cad16ace27883257d91de544c78c1bf06892d6f86e44b
SHA512fe1452b12bb64b92ee02452fdcd382c512135894a2d635301dd4f1ed3d1cf584321b6726b51997f39ffcff2b47107bb4e1d9d16bc6817eae5300c45ae6184b1d
-
Filesize
5KB
MD5cc754a54f4c748a05942f7676fe5eb50
SHA11f22f0c2b3360d16a7ebabca3fe6b023870d9535
SHA256f7bba681f02389bdb4471bcef5f576db7639879e61d7260ff63ba1185e291fca
SHA51223ecc16053523547411b7279a0a3493a92daae77974d87cc44c29513f59730049b383ef197a194a77392830481bf51edb6eeeecae285945ec9c845cff656eabe
-
Filesize
327KB
MD5a4cc2d055427ab48e6323360250433e8
SHA1a88fe1182074a402a28862c66d0ac404116e8a4a
SHA256d46d25a70976db5f373fb7a2e93adaf9b3ace962dc95d3c45f4f58f5de033f60
SHA5126f5cae9adaed2d7e982276a075bb69aa6206cec918f74f6f6c207e1066dbb0882ed1368ca2b5f63601f7a3ba786ec9ee31bf471a9eff30ac2a30c5ab2ff11869
-
Filesize
327KB
MD5a4cc2d055427ab48e6323360250433e8
SHA1a88fe1182074a402a28862c66d0ac404116e8a4a
SHA256d46d25a70976db5f373fb7a2e93adaf9b3ace962dc95d3c45f4f58f5de033f60
SHA5126f5cae9adaed2d7e982276a075bb69aa6206cec918f74f6f6c207e1066dbb0882ed1368ca2b5f63601f7a3ba786ec9ee31bf471a9eff30ac2a30c5ab2ff11869
-
Filesize
327KB
MD5a4cc2d055427ab48e6323360250433e8
SHA1a88fe1182074a402a28862c66d0ac404116e8a4a
SHA256d46d25a70976db5f373fb7a2e93adaf9b3ace962dc95d3c45f4f58f5de033f60
SHA5126f5cae9adaed2d7e982276a075bb69aa6206cec918f74f6f6c207e1066dbb0882ed1368ca2b5f63601f7a3ba786ec9ee31bf471a9eff30ac2a30c5ab2ff11869
-
Filesize
327KB
MD5a4cc2d055427ab48e6323360250433e8
SHA1a88fe1182074a402a28862c66d0ac404116e8a4a
SHA256d46d25a70976db5f373fb7a2e93adaf9b3ace962dc95d3c45f4f58f5de033f60
SHA5126f5cae9adaed2d7e982276a075bb69aa6206cec918f74f6f6c207e1066dbb0882ed1368ca2b5f63601f7a3ba786ec9ee31bf471a9eff30ac2a30c5ab2ff11869
-
Filesize
327KB
MD5a4cc2d055427ab48e6323360250433e8
SHA1a88fe1182074a402a28862c66d0ac404116e8a4a
SHA256d46d25a70976db5f373fb7a2e93adaf9b3ace962dc95d3c45f4f58f5de033f60
SHA5126f5cae9adaed2d7e982276a075bb69aa6206cec918f74f6f6c207e1066dbb0882ed1368ca2b5f63601f7a3ba786ec9ee31bf471a9eff30ac2a30c5ab2ff11869
-
Filesize
327KB
MD5a4cc2d055427ab48e6323360250433e8
SHA1a88fe1182074a402a28862c66d0ac404116e8a4a
SHA256d46d25a70976db5f373fb7a2e93adaf9b3ace962dc95d3c45f4f58f5de033f60
SHA5126f5cae9adaed2d7e982276a075bb69aa6206cec918f74f6f6c207e1066dbb0882ed1368ca2b5f63601f7a3ba786ec9ee31bf471a9eff30ac2a30c5ab2ff11869