Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:02
Static task
static1
Behavioral task
behavioral1
Sample
Proof Of Payment- Swift Copy.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Proof Of Payment- Swift Copy.exe
Resource
win10v2004-20240802-en
General
-
Target
Proof Of Payment- Swift Copy.exe
-
Size
672KB
-
MD5
39ece2abddd8cd86565c3c4dd83a08f2
-
SHA1
0b605de9bbda10d8d70759812ec2e90ba128e7a6
-
SHA256
b147b7f7e30fe740ba8adb0c1b376b5df25a27b59275a41c872f1ee0956415f2
-
SHA512
5cabb9bea16ff13577cb65ce55d85c561af28396055134c33af5b5fc258381cdf93e0072c1dee1179247fdff8c488e350cf83dbc41e25f6ba1bef8eebaa6cc54
-
SSDEEP
12288:qr9UEWtpNOoR4XiqzD5634pVGf0mT+x31ETqA+163KzfVrWAhn7aQGNDT9I:UWtpI4SMZTguTq9oWNrWomQGNDm
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.gtpv.online - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2568 set thread context of 2160 2568 Proof Of Payment- Swift Copy.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2924 2160 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Proof Of Payment- Swift Copy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Proof Of Payment- Swift Copy.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2568 Proof Of Payment- Swift Copy.exe 2568 Proof Of Payment- Swift Copy.exe 2160 Proof Of Payment- Swift Copy.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2568 Proof Of Payment- Swift Copy.exe Token: SeDebugPrivilege 2160 Proof Of Payment- Swift Copy.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2324 2568 Proof Of Payment- Swift Copy.exe 31 PID 2568 wrote to memory of 2324 2568 Proof Of Payment- Swift Copy.exe 31 PID 2568 wrote to memory of 2324 2568 Proof Of Payment- Swift Copy.exe 31 PID 2568 wrote to memory of 2324 2568 Proof Of Payment- Swift Copy.exe 31 PID 2568 wrote to memory of 2160 2568 Proof Of Payment- Swift Copy.exe 32 PID 2568 wrote to memory of 2160 2568 Proof Of Payment- Swift Copy.exe 32 PID 2568 wrote to memory of 2160 2568 Proof Of Payment- Swift Copy.exe 32 PID 2568 wrote to memory of 2160 2568 Proof Of Payment- Swift Copy.exe 32 PID 2568 wrote to memory of 2160 2568 Proof Of Payment- Swift Copy.exe 32 PID 2568 wrote to memory of 2160 2568 Proof Of Payment- Swift Copy.exe 32 PID 2568 wrote to memory of 2160 2568 Proof Of Payment- Swift Copy.exe 32 PID 2568 wrote to memory of 2160 2568 Proof Of Payment- Swift Copy.exe 32 PID 2568 wrote to memory of 2160 2568 Proof Of Payment- Swift Copy.exe 32 PID 2160 wrote to memory of 2924 2160 Proof Of Payment- Swift Copy.exe 33 PID 2160 wrote to memory of 2924 2160 Proof Of Payment- Swift Copy.exe 33 PID 2160 wrote to memory of 2924 2160 Proof Of Payment- Swift Copy.exe 33 PID 2160 wrote to memory of 2924 2160 Proof Of Payment- Swift Copy.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Proof Of Payment- Swift Copy.exe"C:\Users\Admin\AppData\Local\Temp\Proof Of Payment- Swift Copy.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\Proof Of Payment- Swift Copy.exe"C:\Users\Admin\AppData\Local\Temp\Proof Of Payment- Swift Copy.exe"2⤵PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\Proof Of Payment- Swift Copy.exe"C:\Users\Admin\AppData\Local\Temp\Proof Of Payment- Swift Copy.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 10923⤵
- Program crash
PID:2924
-
-