Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 04:18
Static task
static1
Behavioral task
behavioral1
Sample
cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe
-
Size
993KB
-
MD5
109999f2dd1c17c2f9824fe52d15857b
-
SHA1
ccc28bea9a2d7f888291a3ff846a6f820509f1a8
-
SHA256
cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87
-
SHA512
9c260cd2764d4a6b33b2a119825c6ce0e3e759cecf02adfe10e1ed72d0e2e5e86de4f5660437c1bbadb9e53a76bd74e3966054daff3b3d7b9a173c98a58d4d26
-
SSDEEP
12288:tqiMp5vpmVSD/bqepRjrByHHjXEbDbMifHzF6rWowo3lItWMTCJqCOl1:RMqObqe7jrmHjXEPbMifTcrh9+tW40O3
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
cp1.virtualine.org - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Loads dropped DLL 2 IoCs
Processes:
cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exepid process 4452 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe 4452 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 29 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exepid process 4696 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.execf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exepid process 4452 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe 4696 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exedescription pid process target process PID 4452 set thread context of 4696 4452 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe -
Drops file in Windows directory 2 IoCs
Processes:
cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exedescription ioc process File opened for modification C:\Windows\resources\0409\backstrap\lejekassernerne.Osc55 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe File opened for modification C:\Windows\resources\ttningslisternes\Poulardes50.sto cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.execf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exepid process 4696 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe 4696 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exepid process 4452 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exedescription pid process Token: SeDebugPrivilege 4696 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exedescription pid process target process PID 4452 wrote to memory of 4696 4452 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe PID 4452 wrote to memory of 4696 4452 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe PID 4452 wrote to memory of 4696 4452 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe PID 4452 wrote to memory of 4696 4452 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe PID 4452 wrote to memory of 4696 4452 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe -
outlook_office_path 1 IoCs
Processes:
cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe -
outlook_win_path 1 IoCs
Processes:
cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe"C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe"C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4696
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD5d584d82e5221c4884dc3062781421038
SHA1d8a56398883028032d6fc1c8630b8a8479127277
SHA256f8d9811bb3d103f15ec0af4c4dea41769bcfb128bb961445461efa233772902a
SHA512071d0f71114e7a0bb94ec3886fe1b9823ab2740b1509c755c8a08f40e4aeb5f04186722ae8a39ae8b66fc35ce4fc5cdee998bd6b85215cb02ef041366645f076
-
Filesize
5B
MD5e2fecc970546c3418917879fe354826c
SHA163f1c1dd01b87704a6b6c99fd9f141e0a3064f16
SHA256ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0
SHA5123c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a
-
Filesize
7B
MD567cfa7364c4cf265b047d87ff2e673ae
SHA156e27889277981a9b63fcf5b218744a125bbc2fa
SHA256639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713
SHA51217f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b
-
Filesize
33B
MD53ad35e1651d29fa2f6dcd7722f5ca36f
SHA1fb94d43c8fec12db5ea14f5af04c1c4e657202d9
SHA256ba19c5bc80f1f84e8bddbae4185dfd07c997855b22f9ecffe37f96e4bf0d7517
SHA51284bf1fc1454252d9fcbf350ddfa041f8656b1d91bb4975b04ba8f2c36294f51e597dedfdd689bca711ea338df4b60826c3339aac3ae611dcb591c3d4e71fcd58
-
Filesize
46B
MD5afe962068d1f3cd6e1990619caa66942
SHA1458b9ac1a98263f766c0c4196e5f72c7bd67f3dd
SHA2560fd0d0a43f85e7a58c444088e1171a596104472a032902b267f31e7d75de3b85
SHA512daf359229cd641fa82c4e69bb826b4da909e3919dfbc521633573cf79c03ae6ebb16bd389e6b4052d7669f8489eac3647cc3f7624d0acecd62f7affb313038df
-
Filesize
55B
MD534403ce6f59bae514d55090e8e6478ac
SHA1f5e4f954af5de278e6cae8e6715ebadb9857aa85
SHA256f773b6be4198314a85e1e78849f73b701f4ae25739aee97f7b6b5fd76d94bf44
SHA512f0d575650db491b99c980c3b72cddb100c98889ec17fd5d5e9d9c5cb76622903f63092b536b1e753f3203582e9ac7535db738394adc6030d5853f587bf7c896d
-
Filesize
13B
MD51783e9a8f74ea827208a35b5a8c0c0b4
SHA168913138931e5d1cdf495708cf86d082454dc6cf
SHA25620ed8777c986040dba3187aab791c6df6f87f42c3002b15bcc8bfa9718d842e8
SHA5128da8702b8e97de4d9cd9c294574e10363e34f3cf7796b1e2c78be543a482472922be3d75a716c67b63a291b898528531c132553ef20174ea99eb3bd37ac3608b
-
Filesize
20B
MD5981d979ec49cb64b078f50013c191acd
SHA118f103644da4913b96391b7d457ded5706e4d0f2
SHA256f4e95849a9bf43f048e70b6beb4716762d41fd3efcb59bc58923386a6e3aeb5b
SHA512d2901d088095cfb15227db5b49f510591e3480be1d4bd16991e794347657bcc4e1e940834961a09d9eaf48c3224886b850973a8eff9cd3ee74f7eec622bb6eba
-
Filesize
41B
MD534f8724a3a772a2de0ccabb072b5ccd1
SHA184ee8e0abbbd3263c6a7e5a95d05c0545154b6e8
SHA256e29c9af6036b8539c52d2625388e268cff4d98747535644d89d4fc48c27edd72
SHA512dca8eed55737be03515ba6401e8a0d47d99a3829e4a35748ad73eb37b1b62a2eddb4a7561fe32b13404e11052a30c17620e47a9f368b0898654fbf6bc91ffb81
-
Filesize
47B
MD5e36e1dde686cd0a4af58f338410c2617
SHA159b8e6e0b5950b80809fdbc262def51345eb484a
SHA2562b1923b72399c7e6f9ec1f4c28d183921089957705c7b59cac4cd57b4870d684
SHA51207845c52d3c67451907da51cd88c1f78442466c71281d2438ecd90c7e95ced97b035d22d0d5bed919f078a14e19dc786b9ef146aeda3eeb9974cdbc10acf4c70
-
Filesize
56B
MD56be1fc61ef445284ae963b5f74615f66
SHA13c1cb4c84d46db513530f271e4f89993217d7291
SHA256b091f88a1dbbde4a52f427ad4af8322dbc07c1f202c26dffc3928b084e6ed53e
SHA5121fb3746bbbbdbee7bb0c36b2e5e0e3903554cbaeb8650632a5ba726b5f4305a641da13ba7d62f051bfc30bfd3e615e4c1be3334244b40c272811692754327913
-
Filesize
8B
MD5c3cb69218b85c3260387fb582cb518dd
SHA1961c892ded09a4cbb5392097bb845ccba65902ad
SHA2561c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101
SHA5122402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422
-
Filesize
17B
MD5aa56823a4614597aa5035bfb3f63c847
SHA1873c3e649bf0b41d9b4d1ee998df6e47abd32841
SHA2567d544ae2f97f0655acb9017ff329202409d17e86552e93c27c08ae532cb57f98
SHA5120a9c4cac8181cdd5638c9bcd1898370c1b51bef5094eaa886e06937e6e36986f31a54b14a0d044c64ef4b332dc5d785dfdaf5ac5e1c067eb4421fd87f2486472
-
Filesize
38B
MD5874eecec3fc35024420ce6005d6991bf
SHA1743f31a53191481b4d1e95cc5d4330c123e69a0a
SHA2561feb2f5544655440d6bdf724776f3fc7b9c9dfb226fe96385423579e03954626
SHA512b5b5ecceeb820a519b3bd277265ed874def5a0a16d1a13af5d60e709cc7e8c8fdfd7a7b7ba694943d00e7a30fb9c267258fd1ed57418c5187acb42177bbe6c6c
-
Filesize
52B
MD55d04a35d3950677049c7a0cf17e37125
SHA1cafdd49a953864f83d387774b39b2657a253470f
SHA256a9493973dd293917f3ebb932ab255f8cac40121707548de100d5969956bb1266
SHA512c7b1afd95299c0712bdbc67f9d2714926d6ec9f71909af615affc400d8d2216ab76f6ac35057088836435de36e919507e1b25be87b07c911083f964eb67e003b
-
Filesize
26B
MD551363b8d2e5583ff2bfea0ad020f8ac0
SHA1bf73704dedd0ed2a6c383f9370d7ce27e19d79ed
SHA256939fb56ca6afb8ec7f034eb2c92880425c966e10a113c87a979130de27701210
SHA512b0217d6ed0dcf3f677cc0e3a890c837968ec33ea5e2c4ba3f324305a8cb5a07d898b9742d7c37d4c3590e0306348af8e07f24fb5b6f68193a5bcd390b7ddd3b5
-
Filesize
30B
MD5f15bfdebb2df02d02c8491bde1b4e9bd
SHA193bd46f57c3316c27cad2605ddf81d6c0bde9301
SHA256c87f2ff45bb530577fb8856df1760edaf1060ae4ee2934b17fdd21b7d116f043
SHA5121757ed4ae4d47d0c839511c18be5d75796224d4a3049e2d8853650ace2c5057c42040de6450bf90dd4969862e9ebb420cd8a34f8dd9c970779ed2e5459e8f2f1
-
Filesize
11KB
MD56ad39193ed20078aa1b23c33a1e48859
SHA195e70e4f47aa1689cc08afbdaef3ec323b5342fa
SHA256b9631423a50c666faf2cc6901c5a8d6eb2fecd306fdd2524256b7e2e37b251c2
SHA51278c89bb8c86f3b68e5314467eca4e8e922d143335081fa66b01d756303e1aec68ed01f4be7098dbe06a789ca32a0f31102f5ba408bc5ab28e61251611bb4f62b