Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 04:18

General

  • Target

    cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe

  • Size

    993KB

  • MD5

    109999f2dd1c17c2f9824fe52d15857b

  • SHA1

    ccc28bea9a2d7f888291a3ff846a6f820509f1a8

  • SHA256

    cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87

  • SHA512

    9c260cd2764d4a6b33b2a119825c6ce0e3e759cecf02adfe10e1ed72d0e2e5e86de4f5660437c1bbadb9e53a76bd74e3966054daff3b3d7b9a173c98a58d4d26

  • SSDEEP

    12288:tqiMp5vpmVSD/bqepRjrByHHjXEbDbMifHzF6rWowo3lItWMTCJqCOl1:RMqObqe7jrmHjXEPbMifTcrh9+tW40O3

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Vipkeylogger family
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe
    "C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4452
    • C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe
      "C:\Users\Admin\AppData\Local\Temp\cf6800448bd20938d5e58be636dac9fd95ada3b8a2360a0e27672726d9c16f87.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:4696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsb7D6E.tmp

    Filesize

    25B

    MD5

    d584d82e5221c4884dc3062781421038

    SHA1

    d8a56398883028032d6fc1c8630b8a8479127277

    SHA256

    f8d9811bb3d103f15ec0af4c4dea41769bcfb128bb961445461efa233772902a

    SHA512

    071d0f71114e7a0bb94ec3886fe1b9823ab2740b1509c755c8a08f40e4aeb5f04186722ae8a39ae8b66fc35ce4fc5cdee998bd6b85215cb02ef041366645f076

  • C:\Users\Admin\AppData\Local\Temp\nsc7F47.tmp

    Filesize

    5B

    MD5

    e2fecc970546c3418917879fe354826c

    SHA1

    63f1c1dd01b87704a6b6c99fd9f141e0a3064f16

    SHA256

    ff91566d755f5d038ae698a2cc0a7d4d14e5273afafc37b6f03afda163768fa0

    SHA512

    3c4a68cbaee94f986515f43305a0e7620c14c30213d4a17db4a3e8a1b996764eb688bf733f472fc52073c2c80bb5229bb29411d7601aefe1c4370e230c341a0a

  • C:\Users\Admin\AppData\Local\Temp\nsc7F47.tmp

    Filesize

    7B

    MD5

    67cfa7364c4cf265b047d87ff2e673ae

    SHA1

    56e27889277981a9b63fcf5b218744a125bbc2fa

    SHA256

    639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713

    SHA512

    17f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b

  • C:\Users\Admin\AppData\Local\Temp\nsc7F47.tmp

    Filesize

    33B

    MD5

    3ad35e1651d29fa2f6dcd7722f5ca36f

    SHA1

    fb94d43c8fec12db5ea14f5af04c1c4e657202d9

    SHA256

    ba19c5bc80f1f84e8bddbae4185dfd07c997855b22f9ecffe37f96e4bf0d7517

    SHA512

    84bf1fc1454252d9fcbf350ddfa041f8656b1d91bb4975b04ba8f2c36294f51e597dedfdd689bca711ea338df4b60826c3339aac3ae611dcb591c3d4e71fcd58

  • C:\Users\Admin\AppData\Local\Temp\nsc7F47.tmp

    Filesize

    46B

    MD5

    afe962068d1f3cd6e1990619caa66942

    SHA1

    458b9ac1a98263f766c0c4196e5f72c7bd67f3dd

    SHA256

    0fd0d0a43f85e7a58c444088e1171a596104472a032902b267f31e7d75de3b85

    SHA512

    daf359229cd641fa82c4e69bb826b4da909e3919dfbc521633573cf79c03ae6ebb16bd389e6b4052d7669f8489eac3647cc3f7624d0acecd62f7affb313038df

  • C:\Users\Admin\AppData\Local\Temp\nsc7F47.tmp

    Filesize

    55B

    MD5

    34403ce6f59bae514d55090e8e6478ac

    SHA1

    f5e4f954af5de278e6cae8e6715ebadb9857aa85

    SHA256

    f773b6be4198314a85e1e78849f73b701f4ae25739aee97f7b6b5fd76d94bf44

    SHA512

    f0d575650db491b99c980c3b72cddb100c98889ec17fd5d5e9d9c5cb76622903f63092b536b1e753f3203582e9ac7535db738394adc6030d5853f587bf7c896d

  • C:\Users\Admin\AppData\Local\Temp\nsh7EC9.tmp

    Filesize

    13B

    MD5

    1783e9a8f74ea827208a35b5a8c0c0b4

    SHA1

    68913138931e5d1cdf495708cf86d082454dc6cf

    SHA256

    20ed8777c986040dba3187aab791c6df6f87f42c3002b15bcc8bfa9718d842e8

    SHA512

    8da8702b8e97de4d9cd9c294574e10363e34f3cf7796b1e2c78be543a482472922be3d75a716c67b63a291b898528531c132553ef20174ea99eb3bd37ac3608b

  • C:\Users\Admin\AppData\Local\Temp\nsh7EC9.tmp

    Filesize

    20B

    MD5

    981d979ec49cb64b078f50013c191acd

    SHA1

    18f103644da4913b96391b7d457ded5706e4d0f2

    SHA256

    f4e95849a9bf43f048e70b6beb4716762d41fd3efcb59bc58923386a6e3aeb5b

    SHA512

    d2901d088095cfb15227db5b49f510591e3480be1d4bd16991e794347657bcc4e1e940834961a09d9eaf48c3224886b850973a8eff9cd3ee74f7eec622bb6eba

  • C:\Users\Admin\AppData\Local\Temp\nsh7EC9.tmp

    Filesize

    41B

    MD5

    34f8724a3a772a2de0ccabb072b5ccd1

    SHA1

    84ee8e0abbbd3263c6a7e5a95d05c0545154b6e8

    SHA256

    e29c9af6036b8539c52d2625388e268cff4d98747535644d89d4fc48c27edd72

    SHA512

    dca8eed55737be03515ba6401e8a0d47d99a3829e4a35748ad73eb37b1b62a2eddb4a7561fe32b13404e11052a30c17620e47a9f368b0898654fbf6bc91ffb81

  • C:\Users\Admin\AppData\Local\Temp\nsh7EC9.tmp

    Filesize

    47B

    MD5

    e36e1dde686cd0a4af58f338410c2617

    SHA1

    59b8e6e0b5950b80809fdbc262def51345eb484a

    SHA256

    2b1923b72399c7e6f9ec1f4c28d183921089957705c7b59cac4cd57b4870d684

    SHA512

    07845c52d3c67451907da51cd88c1f78442466c71281d2438ecd90c7e95ced97b035d22d0d5bed919f078a14e19dc786b9ef146aeda3eeb9974cdbc10acf4c70

  • C:\Users\Admin\AppData\Local\Temp\nsh7EC9.tmp

    Filesize

    56B

    MD5

    6be1fc61ef445284ae963b5f74615f66

    SHA1

    3c1cb4c84d46db513530f271e4f89993217d7291

    SHA256

    b091f88a1dbbde4a52f427ad4af8322dbc07c1f202c26dffc3928b084e6ed53e

    SHA512

    1fb3746bbbbdbee7bb0c36b2e5e0e3903554cbaeb8650632a5ba726b5f4305a641da13ba7d62f051bfc30bfd3e615e4c1be3334244b40c272811692754327913

  • C:\Users\Admin\AppData\Local\Temp\nsm7E4B.tmp

    Filesize

    8B

    MD5

    c3cb69218b85c3260387fb582cb518dd

    SHA1

    961c892ded09a4cbb5392097bb845ccba65902ad

    SHA256

    1c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101

    SHA512

    2402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422

  • C:\Users\Admin\AppData\Local\Temp\nsm7E4B.tmp

    Filesize

    17B

    MD5

    aa56823a4614597aa5035bfb3f63c847

    SHA1

    873c3e649bf0b41d9b4d1ee998df6e47abd32841

    SHA256

    7d544ae2f97f0655acb9017ff329202409d17e86552e93c27c08ae532cb57f98

    SHA512

    0a9c4cac8181cdd5638c9bcd1898370c1b51bef5094eaa886e06937e6e36986f31a54b14a0d044c64ef4b332dc5d785dfdaf5ac5e1c067eb4421fd87f2486472

  • C:\Users\Admin\AppData\Local\Temp\nsm7E4B.tmp

    Filesize

    38B

    MD5

    874eecec3fc35024420ce6005d6991bf

    SHA1

    743f31a53191481b4d1e95cc5d4330c123e69a0a

    SHA256

    1feb2f5544655440d6bdf724776f3fc7b9c9dfb226fe96385423579e03954626

    SHA512

    b5b5ecceeb820a519b3bd277265ed874def5a0a16d1a13af5d60e709cc7e8c8fdfd7a7b7ba694943d00e7a30fb9c267258fd1ed57418c5187acb42177bbe6c6c

  • C:\Users\Admin\AppData\Local\Temp\nsm7E4B.tmp

    Filesize

    52B

    MD5

    5d04a35d3950677049c7a0cf17e37125

    SHA1

    cafdd49a953864f83d387774b39b2657a253470f

    SHA256

    a9493973dd293917f3ebb932ab255f8cac40121707548de100d5969956bb1266

    SHA512

    c7b1afd95299c0712bdbc67f9d2714926d6ec9f71909af615affc400d8d2216ab76f6ac35057088836435de36e919507e1b25be87b07c911083f964eb67e003b

  • C:\Users\Admin\AppData\Local\Temp\nss7FF4.tmp

    Filesize

    26B

    MD5

    51363b8d2e5583ff2bfea0ad020f8ac0

    SHA1

    bf73704dedd0ed2a6c383f9370d7ce27e19d79ed

    SHA256

    939fb56ca6afb8ec7f034eb2c92880425c966e10a113c87a979130de27701210

    SHA512

    b0217d6ed0dcf3f677cc0e3a890c837968ec33ea5e2c4ba3f324305a8cb5a07d898b9742d7c37d4c3590e0306348af8e07f24fb5b6f68193a5bcd390b7ddd3b5

  • C:\Users\Admin\AppData\Local\Temp\nss7FF4.tmp

    Filesize

    30B

    MD5

    f15bfdebb2df02d02c8491bde1b4e9bd

    SHA1

    93bd46f57c3316c27cad2605ddf81d6c0bde9301

    SHA256

    c87f2ff45bb530577fb8856df1760edaf1060ae4ee2934b17fdd21b7d116f043

    SHA512

    1757ed4ae4d47d0c839511c18be5d75796224d4a3049e2d8853650ace2c5057c42040de6450bf90dd4969862e9ebb420cd8a34f8dd9c970779ed2e5459e8f2f1

  • C:\Users\Admin\AppData\Local\Temp\nsw7E3A.tmp\System.dll

    Filesize

    11KB

    MD5

    6ad39193ed20078aa1b23c33a1e48859

    SHA1

    95e70e4f47aa1689cc08afbdaef3ec323b5342fa

    SHA256

    b9631423a50c666faf2cc6901c5a8d6eb2fecd306fdd2524256b7e2e37b251c2

    SHA512

    78c89bb8c86f3b68e5314467eca4e8e922d143335081fa66b01d756303e1aec68ed01f4be7098dbe06a789ca32a0f31102f5ba408bc5ab28e61251611bb4f62b

  • memory/4452-567-0x0000000004A10000-0x000000000772C000-memory.dmp

    Filesize

    45.1MB

  • memory/4452-568-0x0000000076F41000-0x0000000077061000-memory.dmp

    Filesize

    1.1MB

  • memory/4452-569-0x0000000004A10000-0x000000000772C000-memory.dmp

    Filesize

    45.1MB

  • memory/4452-570-0x0000000010004000-0x0000000010005000-memory.dmp

    Filesize

    4KB

  • memory/4452-571-0x0000000004A10000-0x000000000772C000-memory.dmp

    Filesize

    45.1MB

  • memory/4696-573-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/4696-572-0x00000000016E0000-0x00000000043FC000-memory.dmp

    Filesize

    45.1MB

  • memory/4696-574-0x0000000000480000-0x00000000004C8000-memory.dmp

    Filesize

    288KB

  • memory/4696-575-0x0000000036CE0000-0x0000000037284000-memory.dmp

    Filesize

    5.6MB

  • memory/4696-576-0x0000000036C10000-0x0000000036CAC000-memory.dmp

    Filesize

    624KB

  • memory/4696-578-0x00000000016E0000-0x00000000043FC000-memory.dmp

    Filesize

    45.1MB

  • memory/4696-579-0x0000000037A30000-0x0000000037BF2000-memory.dmp

    Filesize

    1.8MB

  • memory/4696-580-0x0000000037C10000-0x0000000037C60000-memory.dmp

    Filesize

    320KB

  • memory/4696-582-0x0000000037CE0000-0x0000000037D72000-memory.dmp

    Filesize

    584KB

  • memory/4696-583-0x0000000037DD0000-0x0000000037DDA000-memory.dmp

    Filesize

    40KB