Analysis
-
max time kernel
28s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31-03-2023 22:26
Behavioral task
behavioral1
Sample
e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe
Resource
win10v2004-20230220-en
General
-
Target
e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe
-
Size
513KB
-
MD5
f32cbfaecc2e973799c7e8977a23fbc1
-
SHA1
51a65b71f953c3e988f0a4a2d4e69ea6ca8b2b8f
-
SHA256
e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305
-
SHA512
85c3aea4fbca17e79833b33b73931b566b7d8ffa70318ac3c772054501105afd7bf659009b3c63550d8c9bcf803481e01341923071e2926c7bdc21b0ba9729c1
-
SSDEEP
12288:DZ8M7gu9seB5mV+mMBYJf0hdrK8BnbPZl/xld44ILZn7EqhZ:DWM7gu9seB8gzBjde8BjZl/xTlIx
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main payload 5 IoCs
resource yara_rule behavioral1/memory/1596-54-0x00000000010C0000-0x0000000001146000-memory.dmp family_masslogger behavioral1/memory/1596-56-0x00000000004C0000-0x0000000000500000-memory.dmp family_masslogger behavioral1/memory/1596-57-0x00000000004C0000-0x0000000000500000-memory.dmp family_masslogger behavioral1/memory/968-60-0x0000000002730000-0x0000000002770000-memory.dmp family_masslogger behavioral1/memory/968-61-0x0000000002730000-0x0000000002770000-memory.dmp family_masslogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe -
Deletes itself 1 IoCs
pid Process 968 powershell.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Key queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1596 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe 1596 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe 1596 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe 968 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1596 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe Token: SeDebugPrivilege 968 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1596 wrote to memory of 968 1596 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe 29 PID 1596 wrote to memory of 968 1596 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe 29 PID 1596 wrote to memory of 968 1596 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe 29 PID 1596 wrote to memory of 968 1596 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe"C:\Users\Admin\AppData\Local\Temp\e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe"1⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1596 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\e64ff6e23ce8911e74ee402d2cc1ed3d54998a56a6fb272b50c5a87363975305.exe'2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:968
-