Analysis
-
max time kernel
298s -
max time network
279s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 15:24
Static task
static1
Behavioral task
behavioral1
Sample
script_decoded.ps1
Resource
win10v2004-20241007-en
General
-
Target
script_decoded.ps1
-
Size
31KB
-
MD5
0e7098ab1308e2b8376bbeff1bb0c0a9
-
SHA1
1af3f6f5d2e1d857983abb33a38e2e68ec010f09
-
SHA256
a967281b40b827e8e2e4f51656dc63f9812006dd034d2565ff9366c3f04eaf20
-
SHA512
5f2531b2d9464c20689d994a3b8bc1f0aab5b7732bcfd42b5f18e262ddbca14fa6a416c987eb27ed97a1db0c9c572c8dc32816895761f8325d304c4f1e040fe1
-
SSDEEP
768:w0SUlvkUjIiKjOEEPx7GP7J7X9tS7jUXJSs11OaUxLJ:w7UlcnRCEEPxcRw7ejNCV
Malware Config
Extracted
Protocol: smtp- Host:
mail.tlakovec.si - Port:
587 - Username:
[email protected] - Password:
@nartsantelps
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.tlakovec.si - Port:
587 - Username:
[email protected] - Password:
@nartsantelps - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Blocklisted process makes network request 12 IoCs
flow pid Process 12 5040 powershell.exe 15 5040 powershell.exe 49 3100 msiexec.exe 51 3100 msiexec.exe 53 3100 msiexec.exe 55 3100 msiexec.exe 56 3100 msiexec.exe 58 3100 msiexec.exe 61 3100 msiexec.exe 64 3100 msiexec.exe 67 3100 msiexec.exe 72 3100 msiexec.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 11 drive.google.com 12 drive.google.com 49 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 57 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3100 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4884 powershell.exe 3100 msiexec.exe -
pid Process 5040 powershell.exe 2640 powershell.exe 4884 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 5040 powershell.exe 5040 powershell.exe 2640 powershell.exe 2640 powershell.exe 4884 powershell.exe 4884 powershell.exe 4884 powershell.exe 3100 msiexec.exe 3100 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4884 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5040 powershell.exe Token: SeDebugPrivilege 2640 powershell.exe Token: SeDebugPrivilege 4884 powershell.exe Token: SeDebugPrivilege 3100 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2640 wrote to memory of 4884 2640 powershell.exe 96 PID 2640 wrote to memory of 4884 2640 powershell.exe 96 PID 2640 wrote to memory of 4884 2640 powershell.exe 96 PID 4884 wrote to memory of 3100 4884 powershell.exe 102 PID 4884 wrote to memory of 3100 4884 powershell.exe 102 PID 4884 wrote to memory of 3100 4884 powershell.exe 102 PID 4884 wrote to memory of 3100 4884 powershell.exe 102 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\script_decoded.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\script_decoded.ps1"1⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\script_decoded.ps12⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Accesses Microsoft Outlook profiles
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3100
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fca0f9b99d3114c40a56fc2b22a8e07e
SHA19d5a1d6efcd4a55f2bbc72bdd7cc0645168552f7
SHA256d8bbc5d969763b918993ecd7cfc29295e558a8b0f2f53799b2f8273e564b63eb
SHA5128b52cdf9cd124675f685701e37f0a90e85f37e6bbde5b48cfb8edfba56d57cc46622fee2ef64368292cf1eff4177cfd3f59b38ba4d5b469bf2e2d17a30e0f37d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
446KB
MD57c0ef84d908c7fa97de1ec867e85c2af
SHA168b5a2fc9bb5ca868d8d821178f5b0bd396cdab1
SHA256369bc5334386de2d8d5891210c2942ae00b273e5abadd43899ed33e231e74445
SHA512b0fdd8ef36d8d8254400a3b5b84a9d04bce5ffb57defb6bf99201dccf9a519bf59e1fb167c71246a4b2c22123596af2d680fbf84434429e1c661ed339e4608dc