Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 15:05

General

  • Target

    rJustificantedepago.exe

  • Size

    738KB

  • MD5

    884358a9e9da158f576b7b7e42521d70

  • SHA1

    a9d488b27fc2d65df89c1049c9cdf380e37e435f

  • SHA256

    7821d35c1866a3ecd43b15d6a171fd9f11d70907105cc27f6b7f0760ca86bccd

  • SHA512

    630c905e255424dc8e54a8b945aaa5673e6ff25fe4e2f9713b73a3f5a622ff8f5d33bfc06ccecd85e5017bac27e31007c878acba32af509000a6c51fdaea0216

  • SSDEEP

    12288:javPpBdFOdWbKSYQNGHkROyGOs61IYZVAecgs9FMa1Mdq8jJN:javzLDK+NjDGMIYO7MoON

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Blocklisted process makes network request 13 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rJustificantedepago.exe
    "C:\Users\Admin\AppData\Local\Temp\rJustificantedepago.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$supportable=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\superincomprehensible\Variabelforklaringen.Adi';$Svinehundens=$supportable.SubString(52555,3);.$Svinehundens($supportable)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:872
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\SysWOW64\msiexec.exe"
        3⤵
        • Accesses Microsoft Outlook profiles
        • Blocklisted process makes network request
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1568
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$supportable=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\superincomprehensible\Variabelforklaringen.Adi';$Svinehundens=$supportable.SubString(52555,3);.$Svinehundens($supportable)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3560
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\SysWOW64\msiexec.exe"
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        PID:2284
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 2020
          4⤵
          • Program crash
          PID:1888
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2284 -ip 2284
    1⤵
      PID:4936

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

      Filesize

      854B

      MD5

      e935bc5762068caf3e24a2683b1b8a88

      SHA1

      82b70eb774c0756837fe8d7acbfeec05ecbf5463

      SHA256

      a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

      SHA512

      bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      1KB

      MD5

      a6c8d80c2d3beed73d7a189ff348a21b

      SHA1

      3865b28f472424e6f1ef7b19223b7b31d61a61d3

      SHA256

      7487c912cea83b26dfdb258eb267aff87552b9b560e4c3883af9fafabf139347

      SHA512

      5c662dc95647aa700adea7597c8e3c6e383fdfaca49ad3baf7e52d0c9d11f57e5f244641e8bdf4fd8f5a10ea1c37c80f637f54e4de4fe3510c87fe96cb752205

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_831B21EC05D416A4ADB2370CD79ABCDD

      Filesize

      471B

      MD5

      30b8219664afbb8d78a27969e8755ca1

      SHA1

      31e8ce9f55ef615280b21beb3eb5fb2f823f41df

      SHA256

      91324c7e829db20de8d55d5a425c5ac46c5551023221d4e36e2b61218f30815a

      SHA512

      5eb0d0d99460e54f69581cf35c20841efdabe17255d12b03e9f460dff723e8f2980b166fa9b71b6042034aa6b6fd2d7a70536dd1176bb13fb5981bcae14d4f4f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_CFDBFDB29AA6A71EBDC3E04CD6E276F4

      Filesize

      472B

      MD5

      a1f013adb9ec5f40524a6635540e628f

      SHA1

      76ed661478849d5bbe5c847d1e05f81becdd67dd

      SHA256

      450676438e2163fea2e341a9756355502bc35acc46efc68264578dfa76b30ab2

      SHA512

      9426895082573c3f5cf12b20b27f1733c64e9fe69757394e49f7491509a0b397c5bdf07bd0ae6ac8821640c7759ebe17725a8f507eb878fff7750c3c0b557c27

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

      Filesize

      170B

      MD5

      f00b1c76b3ffcc6276db7b1c5454eb2b

      SHA1

      10998edea35c148ef9b1a55ab4e00efac879385e

      SHA256

      d69b0f7cd489a1f350600c386b38b8010b1d5203b9ffd2a47d0331fbba46bb09

      SHA512

      0844c55a425837167f2bcb639234ede192a5151b1ef06f74352591e8fb7ff1263203b55e563f9f39562de5e9eea0045426166a062f3e3912a837748dba6c3ba7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

      Filesize

      170B

      MD5

      98450fc6fe656d4bed02546acd15f9fd

      SHA1

      421832089fc33009e5be070584d1fccbf5226e5b

      SHA256

      039989aa2773b160b9954bb9d54341bc74d5ec90c1ec644410b1bfc853b9f8c5

      SHA512

      c6ad91d60c1767546cf0d21616c32c29fa67e241707f8ab42465c297d1ab1677865ba7edeaf3b63cdf271821bae192d140934746e05d492caafc641a30744518

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      130a566120ad365b05c71bd8daac3ce3

      SHA1

      3723f5933b7efce09f73e646ecb91e1b5997ef99

      SHA256

      5e98dd794ee97277c58f858ffe7a43b1b0b19cc0c95990f91afe1e732df3bba4

      SHA512

      e251679f91a46241f0523f62206419ba61fe3447bd3c47e3c882dfdb8c595b9b14af8f1923bb6f4d21d61d913268b4829637ed753d17cc4ee63c7491a09964e3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_831B21EC05D416A4ADB2370CD79ABCDD

      Filesize

      402B

      MD5

      7309abb59d7d1de4cec26d37ebdc12fb

      SHA1

      abaee0b58d08a4831cfca730c347342b1927449a

      SHA256

      589e6b9fa99ae9f717c223797305139c116c118ef64fc9555fe669e5196a0ea3

      SHA512

      763a7501f867d017bde35533e0930d48e7dd721684039ce6a2ce0cd1e56858ee7e9c7062fb5e73c00eda04038d5d35da73fffbb08cb79d107eddfff6bceff2c5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_CFDBFDB29AA6A71EBDC3E04CD6E276F4

      Filesize

      398B

      MD5

      a63bfcc41922c3a096da8ae4234c2de8

      SHA1

      221482b2b8817782eaaff4a71079b04ec6fc1874

      SHA256

      d13ea0c300b76bfd39585b55901be2d61a0d6b91fe6856dc315f21f903412735

      SHA512

      9f9aaee9d4bf60d255787394a45557df5f37d4fd63be368717c047010555d101558d820675db8c82561dafd065302943c53fac5e0893d24f2db382fcced764fb

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_w1bfvjez.s4i.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\superincomprehensible\Variabelforklaringen.Adi

      Filesize

      51KB

      MD5

      b38fc73651b54a201ea1815e9fbdb7e1

      SHA1

      11dcb7973511a7f58eacd0c6b519d4c57b843ece

      SHA256

      3cd2de55689d75d77cd308184060364fcf48b990e025e918233e528a3373a27b

      SHA512

      0e6055ab2c490f2c67184e3dea070f6b0d9cd0e557e1c51d792da53c4674d844d8d5c9a5dd036261437db2bb7b8b8e0425168ac143da01b2b1ce116540989b1d

    • C:\Users\Admin\AppData\Local\Temp\superincomprehensible\Vrler.Dis

      Filesize

      293KB

      MD5

      b334b379bb91d8c85290f62fd3a73c61

      SHA1

      84463e42d1eb3bd86807dc9f7e8d988ed63e07f8

      SHA256

      d01bd6f6fe065a0c2fb2835355a216ff0062ab802ed9da33d56ecea72f5aa444

      SHA512

      02d2d0a0579158c415f5b43dc104883cee88bfd7f77a70185d15c45219bff2148afec80d0d7150d301ca1e65637159b75b646af98a88e2e0b9a45567cbde04bc

    • memory/872-38-0x0000000006E50000-0x0000000006EE6000-memory.dmp

      Filesize

      600KB

    • memory/872-12-0x00000000735B0000-0x0000000073D60000-memory.dmp

      Filesize

      7.7MB

    • memory/872-37-0x0000000005ED0000-0x0000000005F1C000-memory.dmp

      Filesize

      304KB

    • memory/872-39-0x00000000063E0000-0x00000000063FA000-memory.dmp

      Filesize

      104KB

    • memory/872-6-0x00000000735BE000-0x00000000735BF000-memory.dmp

      Filesize

      4KB

    • memory/872-7-0x0000000004920000-0x0000000004956000-memory.dmp

      Filesize

      216KB

    • memory/872-36-0x0000000005EB0000-0x0000000005ECE000-memory.dmp

      Filesize

      120KB

    • memory/872-15-0x0000000004EF0000-0x0000000004F56000-memory.dmp

      Filesize

      408KB

    • memory/872-43-0x00000000080D0000-0x000000000874A000-memory.dmp

      Filesize

      6.5MB

    • memory/872-56-0x00000000735B0000-0x0000000073D60000-memory.dmp

      Filesize

      7.7MB

    • memory/872-16-0x00000000735B0000-0x0000000073D60000-memory.dmp

      Filesize

      7.7MB

    • memory/872-14-0x0000000004E80000-0x0000000004EE6000-memory.dmp

      Filesize

      408KB

    • memory/872-46-0x00000000701C0000-0x0000000070514000-memory.dmp

      Filesize

      3.3MB

    • memory/872-45-0x000000006FA40000-0x000000006FA8C000-memory.dmp

      Filesize

      304KB

    • memory/872-44-0x0000000007300000-0x0000000007332000-memory.dmp

      Filesize

      200KB

    • memory/872-70-0x00000000735B0000-0x0000000073D60000-memory.dmp

      Filesize

      7.7MB

    • memory/872-90-0x00000000735B0000-0x0000000073D60000-memory.dmp

      Filesize

      7.7MB

    • memory/872-85-0x00000000735B0000-0x0000000073D60000-memory.dmp

      Filesize

      7.7MB

    • memory/872-84-0x00000000735B0000-0x0000000073D60000-memory.dmp

      Filesize

      7.7MB

    • memory/872-82-0x0000000008750000-0x000000000BFB2000-memory.dmp

      Filesize

      56.4MB

    • memory/872-79-0x00000000735BE000-0x00000000735BF000-memory.dmp

      Filesize

      4KB

    • memory/872-75-0x0000000007BF0000-0x0000000007C14000-memory.dmp

      Filesize

      144KB

    • memory/872-74-0x0000000007BC0000-0x0000000007BEA000-memory.dmp

      Filesize

      168KB

    • memory/872-13-0x0000000004DE0000-0x0000000004E02000-memory.dmp

      Filesize

      136KB

    • memory/1568-134-0x00000000235F0000-0x00000000235FA000-memory.dmp

      Filesize

      40KB

    • memory/1568-133-0x0000000023C60000-0x0000000023CF2000-memory.dmp

      Filesize

      584KB

    • memory/1568-132-0x0000000023510000-0x0000000023560000-memory.dmp

      Filesize

      320KB

    • memory/1568-131-0x0000000023D90000-0x0000000023F52000-memory.dmp

      Filesize

      1.8MB

    • memory/1568-127-0x0000000023100000-0x000000002319C000-memory.dmp

      Filesize

      624KB

    • memory/1568-126-0x0000000000700000-0x0000000000748000-memory.dmp

      Filesize

      288KB

    • memory/1568-125-0x0000000000700000-0x0000000001954000-memory.dmp

      Filesize

      18.3MB

    • memory/2284-123-0x0000000000C00000-0x0000000001E54000-memory.dmp

      Filesize

      18.3MB

    • memory/2284-128-0x0000000000C00000-0x0000000001E54000-memory.dmp

      Filesize

      18.3MB

    • memory/3560-87-0x00000000735B0000-0x0000000073D60000-memory.dmp

      Filesize

      7.7MB

    • memory/3560-40-0x0000000007770000-0x0000000007792000-memory.dmp

      Filesize

      136KB

    • memory/3560-58-0x00000000735B0000-0x0000000073D60000-memory.dmp

      Filesize

      7.7MB

    • memory/3560-17-0x00000000060F0000-0x0000000006444000-memory.dmp

      Filesize

      3.3MB

    • memory/3560-41-0x0000000007DF0000-0x0000000008394000-memory.dmp

      Filesize

      5.6MB

    • memory/3560-11-0x00000000735B0000-0x0000000073D60000-memory.dmp

      Filesize

      7.7MB

    • memory/3560-9-0x0000000005970000-0x0000000005F98000-memory.dmp

      Filesize

      6.2MB

    • memory/3560-10-0x00000000735B0000-0x0000000073D60000-memory.dmp

      Filesize

      7.7MB

    • memory/3560-8-0x00000000735B0000-0x0000000073D60000-memory.dmp

      Filesize

      7.7MB

    • memory/3560-57-0x000000006FA40000-0x000000006FA8C000-memory.dmp

      Filesize

      304KB

    • memory/3560-69-0x0000000007BB0000-0x0000000007BCE000-memory.dmp

      Filesize

      120KB

    • memory/3560-89-0x00000000735B0000-0x0000000073D60000-memory.dmp

      Filesize

      7.7MB

    • memory/3560-73-0x0000000007D40000-0x0000000007D4A000-memory.dmp

      Filesize

      40KB

    • memory/3560-86-0x00000000735B0000-0x0000000073D60000-memory.dmp

      Filesize

      7.7MB

    • memory/3560-59-0x00000000701C0000-0x0000000070514000-memory.dmp

      Filesize

      3.3MB

    • memory/3560-71-0x0000000007C20000-0x0000000007CC3000-memory.dmp

      Filesize

      652KB

    • memory/3560-72-0x00000000735B0000-0x0000000073D60000-memory.dmp

      Filesize

      7.7MB

    • memory/3560-81-0x00000000735B0000-0x0000000073D60000-memory.dmp

      Filesize

      7.7MB

    • memory/3560-80-0x00000000735B0000-0x0000000073D60000-memory.dmp

      Filesize

      7.7MB