Analysis

  • max time kernel
    141s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2024 02:50

General

  • Target

    cf2afee6c1871706deb922c7105c9e5bf6a2bbaca312b1b4ec4951dcfa033ea7.exe

  • Size

    876KB

  • MD5

    efeb7d261da3f778abf002c69a971eb8

  • SHA1

    f4e570bf56015da2c76faac8dc8f28a7e3a3d8a3

  • SHA256

    cf2afee6c1871706deb922c7105c9e5bf6a2bbaca312b1b4ec4951dcfa033ea7

  • SHA512

    5cbcd6b9b06f63019e9c00e47e4bee071079e81792ea8cd6173d4f544c15b852090f38e3a642dbc51dd357068634a4b769098204f9f409119a3675eb4d98487e

  • SSDEEP

    24576:sw5i21T5xhInKT/Y2ol8tdi817TWdg0F7RR:sV017TWSyR

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf2afee6c1871706deb922c7105c9e5bf6a2bbaca312b1b4ec4951dcfa033ea7.exe
    "C:\Users\Admin\AppData\Local\Temp\cf2afee6c1871706deb922c7105c9e5bf6a2bbaca312b1b4ec4951dcfa033ea7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2884
    • C:\Users\Admin\AppData\Local\Temp\cf2afee6c1871706deb922c7105c9e5bf6a2bbaca312b1b4ec4951dcfa033ea7.exe
      "C:\Users\Admin\AppData\Local\Temp\cf2afee6c1871706deb922c7105c9e5bf6a2bbaca312b1b4ec4951dcfa033ea7.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:1016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsfD277.tmp

    Filesize

    3B

    MD5

    4e27f2226785e9abbe046fc592668860

    SHA1

    28b18a7f383131df509f7191f946a32c5a2e410c

    SHA256

    01a219245e1501fee01ce0baea8f6065ce5162cea12fa570689a07c9717be81d

    SHA512

    2a23585835bdb5db8175cab265566042282841efdcee8aaba8b9b5d466b0f165c0c5973033ce94bb9a8f07a956689247981ea07ac5a51408263e1653d9710adb

  • C:\Users\Admin\AppData\Local\Temp\nsfD277.tmp

    Filesize

    5B

    MD5

    e2fecc970546c3418917879fe354826c

    SHA1

    63f1c1dd01b87704a6b6c99fd9f141e0a3064f16

    SHA256

    ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0

    SHA512

    3c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a

  • C:\Users\Admin\AppData\Local\Temp\nsfD277.tmp

    Filesize

    23B

    MD5

    cc425c0e67a76a3ef42ffd875ac98788

    SHA1

    81867852fcd85548b1dc0d6a4acd4135055ff869

    SHA256

    2787c54979c964e4cc50064d4d89581a327a02067a8efb1be41764f428e9b5ee

    SHA512

    da263e2abfe2b2f1809edd4f67e76051141c16ddc1fd8c19f24e494c1e2bde6cdc099799bedac0cdcc2b5e06a1d6ea2d582023d4dbfb0cf03a690f7daa09d8a6

  • C:\Users\Admin\AppData\Local\Temp\nsfD277.tmp

    Filesize

    39B

    MD5

    51af7f8882a81b532b70bafc8c547d78

    SHA1

    f8b1733242b4fcdeb7c0a9cec9a921b93fe0f4bb

    SHA256

    1bee6f297ac28356caad37bdb005dd95948f73502bc13a92d3059a26bc2518de

    SHA512

    3fc00b4db47c2ba49fd43622eb8e9768b5e9eb0605e0877efd30e4e7a209e50f6b0c36f5047827ea1bea751883121c5f286237936f4d364f2741aea478872f7c

  • C:\Users\Admin\AppData\Local\Temp\nsfD277.tmp

    Filesize

    55B

    MD5

    34ad2f2aaa3a5e66a32bb384c9df8cb4

    SHA1

    31543a5f6cb93ebf880c8aa93b95367f2582da86

    SHA256

    f0b7445f89081ffcac9de742608304e3b31f63a94ac934bac10b51f37cfcf4b0

    SHA512

    d834b127c8d47b40e6d3b45a89f3690577fc43fceeb0839d790afc201069d0d03c8990f90037ed8a81ae685dbb35d47cf1dd7faf5dca106e887f96b8f37ee4df

  • C:\Users\Admin\AppData\Local\Temp\nspD2B6.tmp

    Filesize

    7B

    MD5

    67cfa7364c4cf265b047d87ff2e673ae

    SHA1

    56e27889277981a9b63fcf5b218744a125bbc2fa

    SHA256

    639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713

    SHA512

    17f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b

  • C:\Users\Admin\AppData\Local\Temp\nspD2B6.tmp

    Filesize

    9B

    MD5

    2b3884fe02299c565e1c37ee7ef99293

    SHA1

    d8e2ef2a52083f6df210109fea53860ea227af9c

    SHA256

    ae789a65914ed002efb82dad89e5a4d4b9ec8e7faae30d0ed6e3c0d20f7d3858

    SHA512

    aeb9374a52d0ad99336bfd4ec7bb7c5437b827845b8784d9c21f7d96a931693604689f6adc3ca25fad132a0ad6123013211ff550f427fa86e4f26c122ac6a0fe

  • C:\Users\Admin\AppData\Local\Temp\nspD305.tmp

    Filesize

    7B

    MD5

    9569f680da3f887d04664e48682de964

    SHA1

    e436acf7a9432b525a4825560eb37a19ab983f3d

    SHA256

    ca101d01b0317ffc547b0030192d53167e00177324815d73411d961681466de7

    SHA512

    315340726e5fd412f79415d444db7748b3f77bde3de09b0dd5b3f7e7c1cdf4e0baa7990562666e878fbea48330edae83926620a93aaec0645b5b0f4dd219eeac

  • C:\Users\Admin\AppData\Local\Temp\nspD305.tmp

    Filesize

    17B

    MD5

    e3e52271695d789252499380bab83be2

    SHA1

    a87dda09a98f8ed7ada5db378914743c76acee6f

    SHA256

    96f0ffcdf2308d036f51f1fad5fb1e501f7137ab3c010c165210530c105d9be4

    SHA512

    57f2aa081f3b2c756861dbab5296c1f143026b2f178b45746411fa6e0852fbf0106415801ae99d5d30fecc944296b453fb1b258e9df2f6669c0a8fb6d4a780aa

  • C:\Users\Admin\AppData\Local\Temp\nspD305.tmp

    Filesize

    20B

    MD5

    3bb6070b3e4cbc844c6cee699666f746

    SHA1

    eaeb87f3175746d3c8a0896e35f5f2d3ad4f2d7b

    SHA256

    8678054a5a992d44bb69e4ab770e4d17cd1530511f044754ba3a15e59121cba4

    SHA512

    cf53f306a00ef5ed498c1dcaa426b013a64520938f492d77cd0f1cc15dffe37d465f30b9e15d451e1f85ed8e67f2ebed0930302ddb94b2f7172dd9e4fd6c52f7

  • C:\Users\Admin\AppData\Local\Temp\nsuD236.tmp\System.dll

    Filesize

    11KB

    MD5

    4d3b19a81bd51f8ce44b93643a4e3a99

    SHA1

    35f8b00e85577b014080df98bd2c378351d9b3e9

    SHA256

    fda0018ab182ac6025d2fc9a2efcce3745d1da21ce5141859f8286cf319a52ce

    SHA512

    b2ba9c961c0e1617f802990587a9000979ab5cc493ae2f8ca852eb43eeaf24916b0b29057dbff7d41a1797dfb2dce3db41990e8639b8f205771dbec3fd80f622

  • C:\Users\Admin\AppData\Local\Temp\nsuD237.tmp

    Filesize

    34B

    MD5

    2a9c98ea1aa7a05604ab51073fcd45c7

    SHA1

    3f970ebeb4f5ef40f8bb1e16d64ab410c3af3962

    SHA256

    ba493b1e2704c417662224230bffa2effae24f9fbf8c56a7bcb93ac02bc2abd9

    SHA512

    fe999f6186c4bb20113cfdddba193cf777941a9ce223f0c6d8f85dc5e2668df6f820922d7b75f255ec2d5355f1881f3867686363f4c5f630ffa8b48b079d7647

  • C:\Users\Admin\AppData\Local\Temp\nsuD237.tmp

    Filesize

    49B

    MD5

    1aeb67240bc704bf6cc2fa0a6f52a970

    SHA1

    0d5cbc71d7e606e7f1a68332be8a7a5a7b4be02d

    SHA256

    bbd283b5a658ac95e8811c820de41f911e7559e982d9378b5b14c3f7cb5ccb6d

    SHA512

    c64bdb3c49ff5ca422fe5a4a03fac5145072f7cf692addc23e811ce39c25fc7fcb8e15a07fd770eb8d392d86cfc12c3520b080899a4d2c85646c09b181f2b47c

  • C:\Users\Admin\AppData\Local\Temp\nszD1B8.tmp

    Filesize

    48B

    MD5

    db255f53108568593d80f2b9196f73d5

    SHA1

    e00bde519e33311332599680b51d6c4bdda77f8f

    SHA256

    46cc3e4da899bd4967072208983b1cc3f7bbfdac794a908d90e14f8dc97dd780

    SHA512

    5b1032ca47c32dd2d23230ad83b1ccd2f74139b7c2da086140c93896f56cc65345c25f57cd54427e5786b4cb3ec675ad10184c8018a0e11118a580a1b3c68e87

  • C:\Users\Admin\AppData\Local\Temp\nszD1B8.tmp

    Filesize

    50B

    MD5

    d4e73c2e024084f8a99a4d7f7b87c125

    SHA1

    cd36a406008d290ca754788594cf3d8eeba58169

    SHA256

    dbcd27d2bc601f3f5e3eb88dd23dece5d924d6840f6ec9f6004d0f79ad260f20

    SHA512

    7f7c87fc47e1f0dec6a83b366c8c71bc10e0664a786f80875e1878070be556adb766d4ab1069e47b592949a35141c0079b4b1f78787279115a3e94b91ada15ed

  • C:\Users\Admin\AppData\Local\Temp\nszD1B8.tmp

    Filesize

    54B

    MD5

    8e69760955a717be873f8253ebc6905b

    SHA1

    c813b0cc54451465777460ef2f46bc98c273c739

    SHA256

    3159fb26988fd82c5a652bdf09e65bb021011a4f8953f009c0a7d893149a9c8e

    SHA512

    16de94f841400aeffd2b67ca45e807da10023229f667f746b8fc7b127c347d843ff51b822191e656a94b63d8c8187c928d40113914d34570136c878b64279600

  • C:\Users\Admin\AppData\Local\Temp\nszD1B8.tmp

    Filesize

    60B

    MD5

    15b80dc3d729ab1abd2b7dd56f15dfbb

    SHA1

    38f2c2a96b7a3b7a2092956ba1cd28d93f7f44f4

    SHA256

    a8131e5fa3f1e8a7e35a248fb3da529eb2885731ca6687bac3278f53a698850c

    SHA512

    43cc514b05da8854292008e536e5860902847998f9d2cfce883aae0d3d5bedbe74db9a55ae1c33933af4f9cef40a103cac49a306f88550109397e96c7dc969fc

  • C:\Users\Admin\AppData\Local\Temp\nszD1B8.tmp

    Filesize

    74B

    MD5

    16d513397f3c1f8334e8f3e4fc49828f

    SHA1

    4ee15afca81ca6a13af4e38240099b730d6931f0

    SHA256

    d3c781a1855c8a70f5aca88d9e2c92afffa80541334731f62caa9494aa8a0c36

    SHA512

    4a350b790fdd2fe957e9ab48d5969b217ab19fc7f93f3774f1121a5f140ff9a9eaaa8fa30e06a9ef40ad776e698c2e65a05323c3adf84271da1716e75f5183c3

  • C:\Users\Admin\AppData\Local\Temp\nszD1B8.tmp

    Filesize

    10B

    MD5

    9a53fc1d7126c5e7c81bb5c15b15537b

    SHA1

    e2d13e0fa37de4c98f30c728210d6afafbb2b000

    SHA256

    a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92

    SHA512

    b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1

  • C:\Users\Admin\AppData\Local\Temp\nszD1B8.tmp

    Filesize

    15B

    MD5

    cf7be2840455491f249648c44a1dc759

    SHA1

    9863c7f04f9d674365fe23f257ba43447f985e8e

    SHA256

    769c7c2ec9413a771a2f497862194dfb0200452f3a20f5e1f77ad0b6ae535697

    SHA512

    83984674c9e337bda5ac88c3b2d0e426fd9051e1585b95ea99b3c569ace50900f811e664da9cf426f080837e2b48a5709003b7e5d25382a1ad90026b40777abd

  • C:\Users\Admin\AppData\Local\Temp\nszD1B8.tmp

    Filesize

    18B

    MD5

    1a42166fa1e8a360271d4fb25c78fbda

    SHA1

    f4d1ad6ecdc1202a2c08c03514ec814072b818d2

    SHA256

    b271abd85535886a3753ee0a5e8957a1bf2e502c4a275d1d8f7f5ddf3b7de292

    SHA512

    ee3342a9a407bfe56e7c65c1f1c0b15624fbffc60c88ff9e404a1dbebcfd606f42de8cb61624f992f57fca2e05d75a64611a78e508c7772ffaeb9c5924c87c0c

  • C:\Users\Admin\AppData\Local\Temp\nszD1B8.tmp

    Filesize

    23B

    MD5

    15869c1caed4a9a2871344cb7dbc4d71

    SHA1

    23a9038b70128e16c49f56d0adc433f5b69fd227

    SHA256

    2696fe3f766a4a7724a3ed600da211862279c9c888592de75efbeffd06a6195c

    SHA512

    7ba62e6095dca0015eac6e034ed9afcc38a04665a08813c7567acad1f3c2058e6db3023d3ebc1433938d9d7f139e143d856acbc7f98b51d19f1f10054f596455

  • C:\Users\Admin\AppData\Local\Temp\nszD1B8.tmp

    Filesize

    42B

    MD5

    b6a6fc39000a885d47bb4a68599189d2

    SHA1

    2e6af0f8af28d0ccf111437ebdef42fc9b87d976

    SHA256

    d0e907cfed7dd830efd34ab698cfbc7726f29b52b71479f6ee9cc34087925d26

    SHA512

    79f428030deceb2504105b031f605836640f70e070c23dfc3d8f815c3b08b7377cb53455e8a8333dd7b2fca5507da24682b809eb586d8ce3a223e532a93d9263

  • memory/1016-575-0x0000000000490000-0x00000000016E4000-memory.dmp

    Filesize

    18.3MB

  • memory/1016-580-0x0000000077471000-0x0000000077591000-memory.dmp

    Filesize

    1.1MB

  • memory/1016-586-0x0000000036D10000-0x0000000036D1A000-memory.dmp

    Filesize

    40KB

  • memory/1016-585-0x0000000036C20000-0x0000000036CB2000-memory.dmp

    Filesize

    584KB

  • memory/1016-583-0x0000000036B50000-0x0000000036BA0000-memory.dmp

    Filesize

    320KB

  • memory/1016-571-0x00000000016F0000-0x000000000333A000-memory.dmp

    Filesize

    28.3MB

  • memory/1016-572-0x00000000774F8000-0x00000000774F9000-memory.dmp

    Filesize

    4KB

  • memory/1016-573-0x00000000016F0000-0x000000000333A000-memory.dmp

    Filesize

    28.3MB

  • memory/1016-574-0x0000000077515000-0x0000000077516000-memory.dmp

    Filesize

    4KB

  • memory/1016-582-0x0000000036960000-0x0000000036B22000-memory.dmp

    Filesize

    1.8MB

  • memory/1016-576-0x0000000000490000-0x00000000004D8000-memory.dmp

    Filesize

    288KB

  • memory/1016-577-0x0000000035B20000-0x00000000360C4000-memory.dmp

    Filesize

    5.6MB

  • memory/1016-578-0x0000000036110000-0x00000000361AC000-memory.dmp

    Filesize

    624KB

  • memory/2884-567-0x0000000077471000-0x0000000077591000-memory.dmp

    Filesize

    1.1MB

  • memory/2884-566-0x0000000004830000-0x000000000647A000-memory.dmp

    Filesize

    28.3MB

  • memory/2884-570-0x0000000004830000-0x000000000647A000-memory.dmp

    Filesize

    28.3MB

  • memory/2884-569-0x0000000010004000-0x0000000010005000-memory.dmp

    Filesize

    4KB

  • memory/2884-568-0x0000000004830000-0x000000000647A000-memory.dmp

    Filesize

    28.3MB