Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 15:50
Static task
static1
Behavioral task
behavioral1
Sample
RFQ DO NO17665.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
RFQ DO NO17665.exe
Resource
win10v2004-20240802-en
General
-
Target
RFQ DO NO17665.exe
-
Size
751KB
-
MD5
ec30649f75893731006dff3ea5620320
-
SHA1
30d70f3e5b8a2136765ba2e3e330c2b2d0a73ac3
-
SHA256
0610f4eaa31b99c543cfe5c6036db65ff93b62f55e8309251db74e0d3efb087f
-
SHA512
3c6c1138f138f374602290a3f40c7f7412c44ca5a9b301ec535c720b1b0b87d3b2e16ffe5e2986c60ccbc844a4f857a6e8839f3b7d24ac20ca2e12e1ba94c3f8
-
SSDEEP
12288:haPjRWed/Y133A28bV0+hEQefS73XN2pMhRZBHtBhoPFhDRn0q:h6Bq33ypEJfS8pMh9HtBePln
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7443984555:AAHQ-E3DZtiV1VJfuJbVaFYZMfeJ58spqaE/sendMessage?chat_id=6593768982
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2840 set thread context of 276 2840 RFQ DO NO17665.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ DO NO17665.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ DO NO17665.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2840 RFQ DO NO17665.exe 2840 RFQ DO NO17665.exe 276 RFQ DO NO17665.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2840 RFQ DO NO17665.exe Token: SeDebugPrivilege 276 RFQ DO NO17665.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2848 2840 RFQ DO NO17665.exe 29 PID 2840 wrote to memory of 2848 2840 RFQ DO NO17665.exe 29 PID 2840 wrote to memory of 2848 2840 RFQ DO NO17665.exe 29 PID 2840 wrote to memory of 2848 2840 RFQ DO NO17665.exe 29 PID 2840 wrote to memory of 276 2840 RFQ DO NO17665.exe 30 PID 2840 wrote to memory of 276 2840 RFQ DO NO17665.exe 30 PID 2840 wrote to memory of 276 2840 RFQ DO NO17665.exe 30 PID 2840 wrote to memory of 276 2840 RFQ DO NO17665.exe 30 PID 2840 wrote to memory of 276 2840 RFQ DO NO17665.exe 30 PID 2840 wrote to memory of 276 2840 RFQ DO NO17665.exe 30 PID 2840 wrote to memory of 276 2840 RFQ DO NO17665.exe 30 PID 2840 wrote to memory of 276 2840 RFQ DO NO17665.exe 30 PID 2840 wrote to memory of 276 2840 RFQ DO NO17665.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ DO NO17665.exe"C:\Users\Admin\AppData\Local\Temp\RFQ DO NO17665.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\RFQ DO NO17665.exe"C:\Users\Admin\AppData\Local\Temp\RFQ DO NO17665.exe"2⤵PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ DO NO17665.exe"C:\Users\Admin\AppData\Local\Temp\RFQ DO NO17665.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:276
-