Analysis

  • max time kernel
    75s
  • max time network
    84s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 19:23

General

  • Target

    01. GLOBAL ORIOLE.pdf.exe

  • Size

    1.2MB

  • MD5

    619ee4eec9d7d2ffb4d779d98543fc7a

  • SHA1

    03c441a6bcaaf5e1b24b1ab46753b1e9141f2750

  • SHA256

    8308fec5f677fc6493f751e441d55481223b1bd2e759e0fce9f85b90429920c6

  • SHA512

    ba896872d9b633a0a1cf5daf558426712fc0a703b5d6997ec9192dd30f56fde053a9308818130def05e7db201f1ae9516896ac7f918ce413a7f9815c7f5a7c96

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaClyDVRs+QIPjcSCJGBOeNFO:7JZoQrbTFZY1iaCUP77cU5k

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.r011.com.br
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    akP?=r0&YaA)

Extracted

Family

vipkeylogger

Signatures

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01. GLOBAL ORIOLE.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\01. GLOBAL ORIOLE.pdf.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Users\Admin\AppData\Local\directory\name.exe
      "C:\Users\Admin\AppData\Local\Temp\01. GLOBAL ORIOLE.pdf.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Users\Admin\AppData\Local\Temp\01. GLOBAL ORIOLE.pdf.exe"
        3⤵
        • Accesses Microsoft Outlook profiles
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Dunlop

    Filesize

    242KB

    MD5

    bd5df828a34a86d8c1b79615621e9c8d

    SHA1

    7ec8d2e4c21690543e0f1b3b456ac174b84c8f5a

    SHA256

    7bde511933047a5b5a131167696d6cfed37c4381b480e66cbd6e5350e68bb1e4

    SHA512

    0f37bfe862816cf20950af2cab3489c01c9605b76088f29d9c9b547aff1c744d95fd6a4682a3a933d1dadd229bf1e35d0230c172e5e7187064cce5d4af47cd77

  • \Users\Admin\AppData\Local\directory\name.exe

    Filesize

    1.2MB

    MD5

    619ee4eec9d7d2ffb4d779d98543fc7a

    SHA1

    03c441a6bcaaf5e1b24b1ab46753b1e9141f2750

    SHA256

    8308fec5f677fc6493f751e441d55481223b1bd2e759e0fce9f85b90429920c6

    SHA512

    ba896872d9b633a0a1cf5daf558426712fc0a703b5d6997ec9192dd30f56fde053a9308818130def05e7db201f1ae9516896ac7f918ce413a7f9815c7f5a7c96

  • memory/2648-2-0x0000000002E10000-0x0000000003010000-memory.dmp

    Filesize

    2.0MB

  • memory/2656-62-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-1117-0x0000000073B90000-0x000000007427E000-memory.dmp

    Filesize

    6.9MB

  • memory/2656-16-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2656-17-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2656-18-0x0000000073B9E000-0x0000000073B9F000-memory.dmp

    Filesize

    4KB

  • memory/2656-19-0x00000000005A0000-0x00000000005FE000-memory.dmp

    Filesize

    376KB

  • memory/2656-20-0x0000000073B90000-0x000000007427E000-memory.dmp

    Filesize

    6.9MB

  • memory/2656-21-0x00000000009B0000-0x0000000000A0C000-memory.dmp

    Filesize

    368KB

  • memory/2656-22-0x0000000073B90000-0x000000007427E000-memory.dmp

    Filesize

    6.9MB

  • memory/2656-48-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-68-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-23-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-82-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-80-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-78-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-76-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-60-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-72-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-70-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-66-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-64-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-1118-0x0000000073B90000-0x000000007427E000-memory.dmp

    Filesize

    6.9MB

  • memory/2656-56-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-14-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2656-74-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-54-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-52-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-50-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-46-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-44-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-42-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-40-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-38-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-36-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-34-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-32-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-30-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-28-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-26-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-24-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2656-189-0x0000000073B90000-0x000000007427E000-memory.dmp

    Filesize

    6.9MB

  • memory/2656-1114-0x0000000073B90000-0x000000007427E000-memory.dmp

    Filesize

    6.9MB

  • memory/2656-1115-0x0000000073B9E000-0x0000000073B9F000-memory.dmp

    Filesize

    4KB

  • memory/2656-1116-0x0000000073B90000-0x000000007427E000-memory.dmp

    Filesize

    6.9MB

  • memory/2656-58-0x00000000009B0000-0x0000000000A07000-memory.dmp

    Filesize

    348KB

  • memory/2752-12-0x0000000003550000-0x0000000003950000-memory.dmp

    Filesize

    4.0MB