Analysis
-
max time kernel
118s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23/10/2024, 06:59
Static task
static1
Behavioral task
behavioral1
Sample
AmountXpayable.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
AmountXpayable.exe
Resource
win10v2004-20241007-en
General
-
Target
AmountXpayable.exe
-
Size
774KB
-
MD5
34cc9882e5f377e3cedc9cd76033afca
-
SHA1
2fe1fb1c072b31f9df45170add68c6c7cf59d27d
-
SHA256
326d05c29c46e6ca7f2f1a9b534d8a2ffb98a13f74f8f26fff2057ad1f8e0ca8
-
SHA512
fc8c41243ee2fc468a2df74ec573ccb955a05b580ed7855c007079edbede6b2e4872de847b73d530809a67edb672ce9932b6be14309e300a32d05e4392c3b45e
-
SSDEEP
12288:BJqGG8+FBxjYKsZAEEErsEKbRsuKJJtJ7e+fGR4o58gkR:dCF7URXr3K9stJi+fGGo5u
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7563060616:AAGgGu8pocoVNLzoow0Ge2U2GVDS9nDmL6Q/sendMessage?chat_id=7222025033
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2100 powershell.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AmountXpayable.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AmountXpayable.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AmountXpayable.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 388 set thread context of 2756 388 AmountXpayable.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AmountXpayable.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AmountXpayable.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2720 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 388 AmountXpayable.exe 388 AmountXpayable.exe 388 AmountXpayable.exe 388 AmountXpayable.exe 388 AmountXpayable.exe 2756 AmountXpayable.exe 2100 powershell.exe 2756 AmountXpayable.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 388 AmountXpayable.exe Token: SeDebugPrivilege 2756 AmountXpayable.exe Token: SeDebugPrivilege 2100 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 388 wrote to memory of 2100 388 AmountXpayable.exe 31 PID 388 wrote to memory of 2100 388 AmountXpayable.exe 31 PID 388 wrote to memory of 2100 388 AmountXpayable.exe 31 PID 388 wrote to memory of 2100 388 AmountXpayable.exe 31 PID 388 wrote to memory of 2720 388 AmountXpayable.exe 33 PID 388 wrote to memory of 2720 388 AmountXpayable.exe 33 PID 388 wrote to memory of 2720 388 AmountXpayable.exe 33 PID 388 wrote to memory of 2720 388 AmountXpayable.exe 33 PID 388 wrote to memory of 2756 388 AmountXpayable.exe 35 PID 388 wrote to memory of 2756 388 AmountXpayable.exe 35 PID 388 wrote to memory of 2756 388 AmountXpayable.exe 35 PID 388 wrote to memory of 2756 388 AmountXpayable.exe 35 PID 388 wrote to memory of 2756 388 AmountXpayable.exe 35 PID 388 wrote to memory of 2756 388 AmountXpayable.exe 35 PID 388 wrote to memory of 2756 388 AmountXpayable.exe 35 PID 388 wrote to memory of 2756 388 AmountXpayable.exe 35 PID 388 wrote to memory of 2756 388 AmountXpayable.exe 35 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AmountXpayable.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AmountXpayable.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AmountXpayable.exe"C:\Users\Admin\AppData\Local\Temp\AmountXpayable.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\urzvuvVy.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\urzvuvVy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1381.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\AmountXpayable.exe"C:\Users\Admin\AppData\Local\Temp\AmountXpayable.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55a52e7ddac7450f6d632c806f82b5d4a
SHA1213d3fafcd8af370e3e91a084da63a734e1ed43c
SHA256728a365d514528acbfaea888de02a6dd9442be1d3e27db76635a177515790d23
SHA512a7b82b98f1c71fe301e1c8f726681e75482e7747ff07b0a5693465ab8d318287eee1aa8720aa53e1badabe29e79743e2144ab46c5938b23b102aacd42be509f0