Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 22:36
Static task
static1
Behavioral task
behavioral1
Sample
PO28466311.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
PO28466311.exe
Resource
win10v2004-20240426-en
General
-
Target
PO28466311.exe
-
Size
1.2MB
-
MD5
052f8ea1a01cb3a6b7df01bfd3868601
-
SHA1
2f75dafd4572c02109d275268534f4935babbe4e
-
SHA256
2c7ac0a31c8828ec11ad0c9dd80f8809fb1248f5c36b6b34d8c9974aa8ecaa06
-
SHA512
f082bdc3eaa1e0383c274aadb03e6c01e0591020cb4107cd072c80fe24e76afafddc4a535a676269efc2c4d3808d7d09faded812211a8e214dec064c02fefe29
-
SSDEEP
12288:oS1QbvgWK5WpLzkQgEuWjzikA1SNuD4cFwJEV6Q576QpVu6kxuCj9Rm:hQbvxaWuQgEfzi1DdFwGBdpUxuCjHm
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main payload 1 IoCs
resource yara_rule behavioral2/memory/4900-178-0x00000000009A0000-0x0000000000A60000-memory.dmp family_masslogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation PO28466311.exe -
Loads dropped DLL 1 IoCs
pid Process 688 PO28466311.exe -
Obfuscated with Agile.Net obfuscator 33 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/688-2-0x0000000002EB0000-0x0000000002ED8000-memory.dmp agile_net behavioral2/memory/688-73-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-71-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-69-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-67-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-65-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-63-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-61-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-59-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-57-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-55-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-53-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-51-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-49-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-47-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-45-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-43-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-41-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-39-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-37-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-35-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-33-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-31-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-29-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-27-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-25-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-23-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-21-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-19-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-17-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-15-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-13-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net behavioral2/memory/688-12-0x0000000002EB0000-0x0000000002ED1000-memory.dmp agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook PO28466311.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PO28466311.exe Key queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook PO28466311.exe Key queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook PO28466311.exe Key queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PO28466311.exe Key queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook PO28466311.exe Key queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook PO28466311.exe Key queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook PO28466311.exe Key queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook PO28466311.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 31 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 688 set thread context of 4900 688 PO28466311.exe 92 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4900 PO28466311.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 688 PO28466311.exe 688 PO28466311.exe 688 PO28466311.exe 4900 PO28466311.exe 4900 PO28466311.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 688 PO28466311.exe Token: SeDebugPrivilege 4900 PO28466311.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4900 PO28466311.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 688 wrote to memory of 4900 688 PO28466311.exe 92 PID 688 wrote to memory of 4900 688 PO28466311.exe 92 PID 688 wrote to memory of 4900 688 PO28466311.exe 92 PID 688 wrote to memory of 4900 688 PO28466311.exe 92 PID 688 wrote to memory of 4900 688 PO28466311.exe 92 PID 688 wrote to memory of 4900 688 PO28466311.exe 92 PID 688 wrote to memory of 4900 688 PO28466311.exe 92 PID 688 wrote to memory of 4900 688 PO28466311.exe 92 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO28466311.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO28466311.exe"C:\Users\Admin\AppData\Local\Temp\PO28466311.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\PO28466311.exe"C:\Users\Admin\AppData\Local\Temp\PO28466311.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fc13935f3038bdde6cb484249fbff668
SHA1a4c32013e6d59bf1eb1a5119456965de191e62b8
SHA256de064c569a5f4edaf2da91d7bcb82bab06a35190b699cede1da0aa616a23d676
SHA5125817275af0f8a48eb1e008d39f62fb3582db9a2d21a806e9f9ee36fbfd799fb17e91f0e3686f4b236724fe78f14ae7f40cd3755f0ec0fb6734ce42f996b798f7
-
Filesize
94KB
MD514ff402962ad21b78ae0b4c43cd1f194
SHA1f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b