Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
df90131c240ef4e9b9079e271d16bb1fa5d797ba57a227eb1883814f35358005.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df90131c240ef4e9b9079e271d16bb1fa5d797ba57a227eb1883814f35358005.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Kmpehjenes.ps1
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
Kmpehjenes.ps1
Resource
win10v2004-20241007-en
General
-
Target
df90131c240ef4e9b9079e271d16bb1fa5d797ba57a227eb1883814f35358005.exe
-
Size
778KB
-
MD5
a992bbd745fa0540c9b12c43f871be00
-
SHA1
0435dd15bfd760449e06c1dd2413a4963539ff27
-
SHA256
df90131c240ef4e9b9079e271d16bb1fa5d797ba57a227eb1883814f35358005
-
SHA512
fdbd173fcaec5728117e5a5de3382b5da110f61799571f60cbf755047b77c9024a638ad558a47316b300a0b7f2053baa05d321f76b09459ce05932d985299737
-
SSDEEP
24576:zr5Ob+mp4ZW3/EYSdCVNF45yRQLvf81BV2m6ionDuf:SGW3GC/e5yiX8HuD+
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.inmogomar.com - Port:
587 - Username:
[email protected] - Password:
Gomar-19600 - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4876 powershell.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 28 844 msiexec.exe 30 844 msiexec.exe 32 844 msiexec.exe 35 844 msiexec.exe 38 844 msiexec.exe 52 844 msiexec.exe 55 844 msiexec.exe 59 844 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 27 drive.google.com 28 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 51 checkip.dyndns.org -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\folkepensionsaldres\frostbiter.ini df90131c240ef4e9b9079e271d16bb1fa5d797ba57a227eb1883814f35358005.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 844 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4876 powershell.exe 844 msiexec.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Levitters.lnk df90131c240ef4e9b9079e271d16bb1fa5d797ba57a227eb1883814f35358005.exe File opened for modification C:\Windows\Levitters.lnk df90131c240ef4e9b9079e271d16bb1fa5d797ba57a227eb1883814f35358005.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df90131c240ef4e9b9079e271d16bb1fa5d797ba57a227eb1883814f35358005.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4876 powershell.exe 4876 powershell.exe 4876 powershell.exe 4876 powershell.exe 4876 powershell.exe 4876 powershell.exe 4876 powershell.exe 4876 powershell.exe 4876 powershell.exe 844 msiexec.exe 844 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4876 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4876 powershell.exe Token: SeIncreaseQuotaPrivilege 4876 powershell.exe Token: SeSecurityPrivilege 4876 powershell.exe Token: SeTakeOwnershipPrivilege 4876 powershell.exe Token: SeLoadDriverPrivilege 4876 powershell.exe Token: SeSystemProfilePrivilege 4876 powershell.exe Token: SeSystemtimePrivilege 4876 powershell.exe Token: SeProfSingleProcessPrivilege 4876 powershell.exe Token: SeIncBasePriorityPrivilege 4876 powershell.exe Token: SeCreatePagefilePrivilege 4876 powershell.exe Token: SeBackupPrivilege 4876 powershell.exe Token: SeRestorePrivilege 4876 powershell.exe Token: SeShutdownPrivilege 4876 powershell.exe Token: SeDebugPrivilege 4876 powershell.exe Token: SeSystemEnvironmentPrivilege 4876 powershell.exe Token: SeRemoteShutdownPrivilege 4876 powershell.exe Token: SeUndockPrivilege 4876 powershell.exe Token: SeManageVolumePrivilege 4876 powershell.exe Token: 33 4876 powershell.exe Token: 34 4876 powershell.exe Token: 35 4876 powershell.exe Token: 36 4876 powershell.exe Token: SeDebugPrivilege 844 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3256 wrote to memory of 4876 3256 df90131c240ef4e9b9079e271d16bb1fa5d797ba57a227eb1883814f35358005.exe 86 PID 3256 wrote to memory of 4876 3256 df90131c240ef4e9b9079e271d16bb1fa5d797ba57a227eb1883814f35358005.exe 86 PID 3256 wrote to memory of 4876 3256 df90131c240ef4e9b9079e271d16bb1fa5d797ba57a227eb1883814f35358005.exe 86 PID 4876 wrote to memory of 844 4876 powershell.exe 98 PID 4876 wrote to memory of 844 4876 powershell.exe 98 PID 4876 wrote to memory of 844 4876 powershell.exe 98 PID 4876 wrote to memory of 844 4876 powershell.exe 98 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df90131c240ef4e9b9079e271d16bb1fa5d797ba57a227eb1883814f35358005.exe"C:\Users\Admin\AppData\Local\Temp\df90131c240ef4e9b9079e271d16bb1fa5d797ba57a227eb1883814f35358005.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Spydspids=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\Stragglier\Kmpehjenes.unt';$Gargle=$Spydspids.SubString(43550,3);.$Gargle($Spydspids)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD543597781601bc20d50b9471e00d7dd55
SHA1e2f85d659088f7a8dbac0a01cb6b369ea081bb0b
SHA2564c010add8f075a98219cfdaea2b8b7cbd6a1d2f596045561916e2c1da7c67631
SHA512be044aaaa9f586318809942495b269ae8dbabd4aeaf4c2c5b70ed51787141bc8cd0ccf4a4fed2921ed3108e1e6edbfdc61b704252631aa2504926bbcd64361ee
-
Filesize
329KB
MD565dfbe3191b2a3fc36608f8e5a8d9c81
SHA19b699082ed301b1c00b5e90d933cc398dfb95fe4
SHA25641269b9e56ee1550922b662734c60837dd0c94b6cff29f50916b6708b1a33803
SHA5129d334be31248d34264624e2ab4014a68561eff5ab886c9209e37d97b5e8ed1d5d9cace6722a4fe0766455e432017c6a6285583f801d033bdef900cef241bdc64
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82