Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
28/10/2024, 11:42
Static task
static1
Behavioral task
behavioral1
Sample
561505602042.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
561505602042.exe
Resource
win10v2004-20241007-en
General
-
Target
561505602042.exe
-
Size
719KB
-
MD5
6ba1202e18f970ce89c7b6462db64884
-
SHA1
0d525a908dff61f4bbd02b4b1d206160bdffe8bc
-
SHA256
3f1a1db52a4fc4fcdcf257626740eb9662546e6a17592d575e4ad2bac6a3748b
-
SHA512
22e785170c12ffd8aab80b633e3c8806b000959c31e55243def82eb541783686c14076091f7be14d1485912a6c745b041e40536a265969e3282a2bd5a93ff172
-
SSDEEP
12288:OMfzuybrVagnUtLYXGAMZKUwPZk1ad6BAKIJwNdbwbIvaHkR:OsVvGLGMkU8ks4AKISkbEP
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.vinatax.us - Port:
587 - Username:
[email protected] - Password:
vinatax@2022 - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2684 powershell.exe 2796 powershell.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 561505602042.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 561505602042.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 561505602042.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2848 set thread context of 1780 2848 561505602042.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561505602042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 561505602042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2672 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2848 561505602042.exe 2848 561505602042.exe 2848 561505602042.exe 2848 561505602042.exe 2848 561505602042.exe 2848 561505602042.exe 2848 561505602042.exe 2848 561505602042.exe 2848 561505602042.exe 1780 561505602042.exe 2848 561505602042.exe 2796 powershell.exe 2684 powershell.exe 1780 561505602042.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2848 561505602042.exe Token: SeDebugPrivilege 1780 561505602042.exe Token: SeDebugPrivilege 2796 powershell.exe Token: SeDebugPrivilege 2684 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2684 2848 561505602042.exe 30 PID 2848 wrote to memory of 2684 2848 561505602042.exe 30 PID 2848 wrote to memory of 2684 2848 561505602042.exe 30 PID 2848 wrote to memory of 2684 2848 561505602042.exe 30 PID 2848 wrote to memory of 2796 2848 561505602042.exe 32 PID 2848 wrote to memory of 2796 2848 561505602042.exe 32 PID 2848 wrote to memory of 2796 2848 561505602042.exe 32 PID 2848 wrote to memory of 2796 2848 561505602042.exe 32 PID 2848 wrote to memory of 2672 2848 561505602042.exe 34 PID 2848 wrote to memory of 2672 2848 561505602042.exe 34 PID 2848 wrote to memory of 2672 2848 561505602042.exe 34 PID 2848 wrote to memory of 2672 2848 561505602042.exe 34 PID 2848 wrote to memory of 1780 2848 561505602042.exe 36 PID 2848 wrote to memory of 1780 2848 561505602042.exe 36 PID 2848 wrote to memory of 1780 2848 561505602042.exe 36 PID 2848 wrote to memory of 1780 2848 561505602042.exe 36 PID 2848 wrote to memory of 1780 2848 561505602042.exe 36 PID 2848 wrote to memory of 1780 2848 561505602042.exe 36 PID 2848 wrote to memory of 1780 2848 561505602042.exe 36 PID 2848 wrote to memory of 1780 2848 561505602042.exe 36 PID 2848 wrote to memory of 1780 2848 561505602042.exe 36 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 561505602042.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 561505602042.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\561505602042.exe"C:\Users\Admin\AppData\Local\Temp\561505602042.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\561505602042.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ZzEKJhWAzrhtW.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZzEKJhWAzrhtW" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC18B.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\561505602042.exe"C:\Users\Admin\AppData\Local\Temp\561505602042.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1780
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e4cbe1917675005179fb0fdb829d5ff6
SHA1a8a367946632a40c979011d62431e524bc51020f
SHA256647709a02c1863ef98563e94d61830169e9fbe8f5a5f975d5fb1c3930fb13cd1
SHA5125931b7af3c1712c918addd60320710f3169eef57230022e84b9c35210408d632eb90ec89ecac5962be8faf89967bcd9d74ec8729bd406eacf2118aead9ec6fc9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD549442e5255c503805e2b679f3a8bb9a6
SHA1a9ba4eb8ddf4799a618cff90763af574f7c0fe33
SHA256baf126a3e332873c0c48f7a0a504d5a289ec92f45b2a855d2e791f38741b37df
SHA5122a7b7078eced322348e3e17b59690f107c80ca1a21c4346de22d2e9701c0d106520fe47aba4a33bcb84dec7b2e723199d774645783d991318c8cbf57bc0ec5db