Analysis
-
max time kernel
61s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 06:52
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT DETAILS CONFIRMATION.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
PAYMENT DETAILS CONFIRMATION.exe
Resource
win10v2004-20240802-en
General
-
Target
PAYMENT DETAILS CONFIRMATION.exe
-
Size
992KB
-
MD5
73c81dd67773b2efa5261e20adf74a5b
-
SHA1
fde0db688d6abb4aad0bb646db9f1c192d980b5a
-
SHA256
ad32cadc3a75e969c0e8c25dfec398378aceb406017050763ce3c5d482998f42
-
SHA512
8b2483b0dedf9d6b9329202d40544291b55601518c3b14f5df764e277114ee6538bdf6d08efcb8c3dad99ac7368471354acb1bf1ecd3f7da2c072f8c5a8e24d9
-
SSDEEP
24576:8I3j32qQLhX/CUoDnbUVo2yhVx/NOMCh/zduiMxVRPXQJA:j6DhaJAMx/NOMChxp8PXg
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2768-20-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral1/memory/2768-17-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral1/memory/2768-15-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral1/memory/2768-12-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger behavioral1/memory/2768-11-0x0000000000400000-0x00000000004B8000-memory.dmp family_masslogger -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
PAYMENT DETAILS CONFIRMATION.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions PAYMENT DETAILS CONFIRMATION.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
PAYMENT DETAILS CONFIRMATION.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools PAYMENT DETAILS CONFIRMATION.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
PAYMENT DETAILS CONFIRMATION.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PAYMENT DETAILS CONFIRMATION.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PAYMENT DETAILS CONFIRMATION.exe -
Deletes itself 1 IoCs
Processes:
powershell.exepid Process 1864 powershell.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
PAYMENT DETAILS CONFIRMATION.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PAYMENT DETAILS CONFIRMATION.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PAYMENT DETAILS CONFIRMATION.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PAYMENT DETAILS CONFIRMATION.exedescription pid Process procid_target PID 1768 set thread context of 2768 1768 PAYMENT DETAILS CONFIRMATION.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exepowershell.exePAYMENT DETAILS CONFIRMATION.exePAYMENT DETAILS CONFIRMATION.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PAYMENT DETAILS CONFIRMATION.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PAYMENT DETAILS CONFIRMATION.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
PAYMENT DETAILS CONFIRMATION.exepowershell.exepid Process 2768 PAYMENT DETAILS CONFIRMATION.exe 2768 PAYMENT DETAILS CONFIRMATION.exe 1864 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
PAYMENT DETAILS CONFIRMATION.exepowershell.exedescription pid Process Token: SeDebugPrivilege 2768 PAYMENT DETAILS CONFIRMATION.exe Token: SeDebugPrivilege 1864 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
PAYMENT DETAILS CONFIRMATION.exePAYMENT DETAILS CONFIRMATION.execmd.exedescription pid Process procid_target PID 1768 wrote to memory of 2768 1768 PAYMENT DETAILS CONFIRMATION.exe 31 PID 1768 wrote to memory of 2768 1768 PAYMENT DETAILS CONFIRMATION.exe 31 PID 1768 wrote to memory of 2768 1768 PAYMENT DETAILS CONFIRMATION.exe 31 PID 1768 wrote to memory of 2768 1768 PAYMENT DETAILS CONFIRMATION.exe 31 PID 1768 wrote to memory of 2768 1768 PAYMENT DETAILS CONFIRMATION.exe 31 PID 1768 wrote to memory of 2768 1768 PAYMENT DETAILS CONFIRMATION.exe 31 PID 1768 wrote to memory of 2768 1768 PAYMENT DETAILS CONFIRMATION.exe 31 PID 1768 wrote to memory of 2768 1768 PAYMENT DETAILS CONFIRMATION.exe 31 PID 1768 wrote to memory of 2768 1768 PAYMENT DETAILS CONFIRMATION.exe 31 PID 2768 wrote to memory of 264 2768 PAYMENT DETAILS CONFIRMATION.exe 32 PID 2768 wrote to memory of 264 2768 PAYMENT DETAILS CONFIRMATION.exe 32 PID 2768 wrote to memory of 264 2768 PAYMENT DETAILS CONFIRMATION.exe 32 PID 2768 wrote to memory of 264 2768 PAYMENT DETAILS CONFIRMATION.exe 32 PID 264 wrote to memory of 1864 264 cmd.exe 34 PID 264 wrote to memory of 1864 264 cmd.exe 34 PID 264 wrote to memory of 1864 264 cmd.exe 34 PID 264 wrote to memory of 1864 264 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\PAYMENT DETAILS CONFIRMATION.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT DETAILS CONFIRMATION.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\PAYMENT DETAILS CONFIRMATION.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT DETAILS CONFIRMATION.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\PAYMENT DETAILS CONFIRMATION.exe' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\PAYMENT DETAILS CONFIRMATION.exe'4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Indicator Removal
1File Deletion
1Virtualization/Sandbox Evasion
2