Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 12:22
Static task
static1
Behavioral task
behavioral1
Sample
c9f7cbb4a9e4e0db0e717cd71d3b5e5162544866bc7c74cde42fb9240cf193db.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c9f7cbb4a9e4e0db0e717cd71d3b5e5162544866bc7c74cde42fb9240cf193db.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Fiskerettens.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Fiskerettens.ps1
Resource
win10v2004-20241007-en
General
-
Target
c9f7cbb4a9e4e0db0e717cd71d3b5e5162544866bc7c74cde42fb9240cf193db.exe
-
Size
1.2MB
-
MD5
cfd68f7d943d702ade1744a68308f0ca
-
SHA1
7e7bb8ff7a01ace1cee4b93d087bfad75aaefa0c
-
SHA256
c9f7cbb4a9e4e0db0e717cd71d3b5e5162544866bc7c74cde42fb9240cf193db
-
SHA512
9a198311992a149e0974d2187be2838a3ed969d284e0722e5a3ddb576c80f0d8eaed6b25683f10ffff8ccfb6bcfcc58ae4ce95747ce8c24e8100387f13f3b7e6
-
SSDEEP
24576:voqqHmQ2mlKCS22++Gpk3C99ZwYAKImqcSb7CkSE9bXy2pf3zxFTB:voZmQ7N25Gpk3CqvTHcQC3E97xF3zTV
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
Comercialplastico3. - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 1968 powershell.exe 1636 powershell.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 16 IoCs
flow pid Process 32 5084 msiexec.exe 33 2872 msiexec.exe 35 2872 msiexec.exe 36 5084 msiexec.exe 38 2872 msiexec.exe 39 5084 msiexec.exe 41 5084 msiexec.exe 42 2872 msiexec.exe 44 5084 msiexec.exe 45 2872 msiexec.exe 50 5084 msiexec.exe 52 5084 msiexec.exe 54 2872 msiexec.exe 56 2872 msiexec.exe 58 5084 msiexec.exe 60 2872 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 31 drive.google.com 32 drive.google.com 33 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 49 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 5084 msiexec.exe 2872 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1636 powershell.exe 1968 powershell.exe 2872 msiexec.exe 5084 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9f7cbb4a9e4e0db0e717cd71d3b5e5162544866bc7c74cde42fb9240cf193db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x000a000000023c85-77.dat nsis_installer_1 behavioral2/files/0x000a000000023c85-77.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1636 powershell.exe 1968 powershell.exe 1968 powershell.exe 1636 powershell.exe 1968 powershell.exe 1968 powershell.exe 1968 powershell.exe 1968 powershell.exe 1968 powershell.exe 1968 powershell.exe 1636 powershell.exe 1636 powershell.exe 1636 powershell.exe 1636 powershell.exe 1636 powershell.exe 1968 powershell.exe 1636 powershell.exe 5084 msiexec.exe 2872 msiexec.exe 5084 msiexec.exe 2872 msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1636 powershell.exe 1968 powershell.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 1968 powershell.exe Token: SeDebugPrivilege 1636 powershell.exe Token: SeIncreaseQuotaPrivilege 1636 powershell.exe Token: SeSecurityPrivilege 1636 powershell.exe Token: SeTakeOwnershipPrivilege 1636 powershell.exe Token: SeLoadDriverPrivilege 1636 powershell.exe Token: SeSystemProfilePrivilege 1636 powershell.exe Token: SeSystemtimePrivilege 1636 powershell.exe Token: SeProfSingleProcessPrivilege 1636 powershell.exe Token: SeIncBasePriorityPrivilege 1636 powershell.exe Token: SeCreatePagefilePrivilege 1636 powershell.exe Token: SeBackupPrivilege 1636 powershell.exe Token: SeRestorePrivilege 1636 powershell.exe Token: SeShutdownPrivilege 1636 powershell.exe Token: SeDebugPrivilege 1636 powershell.exe Token: SeSystemEnvironmentPrivilege 1636 powershell.exe Token: SeRemoteShutdownPrivilege 1636 powershell.exe Token: SeUndockPrivilege 1636 powershell.exe Token: SeManageVolumePrivilege 1636 powershell.exe Token: 33 1636 powershell.exe Token: 34 1636 powershell.exe Token: 35 1636 powershell.exe Token: 36 1636 powershell.exe Token: SeIncreaseQuotaPrivilege 1968 powershell.exe Token: SeSecurityPrivilege 1968 powershell.exe Token: SeTakeOwnershipPrivilege 1968 powershell.exe Token: SeLoadDriverPrivilege 1968 powershell.exe Token: SeSystemProfilePrivilege 1968 powershell.exe Token: SeSystemtimePrivilege 1968 powershell.exe Token: SeProfSingleProcessPrivilege 1968 powershell.exe Token: SeIncBasePriorityPrivilege 1968 powershell.exe Token: SeCreatePagefilePrivilege 1968 powershell.exe Token: SeBackupPrivilege 1968 powershell.exe Token: SeRestorePrivilege 1968 powershell.exe Token: SeShutdownPrivilege 1968 powershell.exe Token: SeDebugPrivilege 1968 powershell.exe Token: SeSystemEnvironmentPrivilege 1968 powershell.exe Token: SeRemoteShutdownPrivilege 1968 powershell.exe Token: SeUndockPrivilege 1968 powershell.exe Token: SeManageVolumePrivilege 1968 powershell.exe Token: 33 1968 powershell.exe Token: 34 1968 powershell.exe Token: 35 1968 powershell.exe Token: 36 1968 powershell.exe Token: SeDebugPrivilege 5084 msiexec.exe Token: SeDebugPrivilege 2872 msiexec.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5008 wrote to memory of 1968 5008 c9f7cbb4a9e4e0db0e717cd71d3b5e5162544866bc7c74cde42fb9240cf193db.exe 83 PID 5008 wrote to memory of 1968 5008 c9f7cbb4a9e4e0db0e717cd71d3b5e5162544866bc7c74cde42fb9240cf193db.exe 83 PID 5008 wrote to memory of 1968 5008 c9f7cbb4a9e4e0db0e717cd71d3b5e5162544866bc7c74cde42fb9240cf193db.exe 83 PID 5008 wrote to memory of 1636 5008 c9f7cbb4a9e4e0db0e717cd71d3b5e5162544866bc7c74cde42fb9240cf193db.exe 85 PID 5008 wrote to memory of 1636 5008 c9f7cbb4a9e4e0db0e717cd71d3b5e5162544866bc7c74cde42fb9240cf193db.exe 85 PID 5008 wrote to memory of 1636 5008 c9f7cbb4a9e4e0db0e717cd71d3b5e5162544866bc7c74cde42fb9240cf193db.exe 85 PID 1636 wrote to memory of 2872 1636 powershell.exe 97 PID 1636 wrote to memory of 2872 1636 powershell.exe 97 PID 1636 wrote to memory of 2872 1636 powershell.exe 97 PID 1636 wrote to memory of 2872 1636 powershell.exe 97 PID 1968 wrote to memory of 5084 1968 powershell.exe 99 PID 1968 wrote to memory of 5084 1968 powershell.exe 99 PID 1968 wrote to memory of 5084 1968 powershell.exe 99 PID 1968 wrote to memory of 5084 1968 powershell.exe 99 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9f7cbb4a9e4e0db0e717cd71d3b5e5162544866bc7c74cde42fb9240cf193db.exe"C:\Users\Admin\AppData\Local\Temp\c9f7cbb4a9e4e0db0e717cd71d3b5e5162544866bc7c74cde42fb9240cf193db.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Analytique=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\carinal\Coracosteon\Fiskerettens.udk';$Terminaladgang=$Analytique.SubString(53834,3);.$Terminaladgang($Analytique)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Analytique=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\carinal\Coracosteon\Fiskerettens.udk';$Terminaladgang=$Analytique.SubString(53834,3);.$Terminaladgang($Analytique)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD569f99c86fe2eb364c85f2855eaf0181c
SHA1b2c67cb14b0fa995cfb28fee7f88900dff16e141
SHA2568abdc75405022ee5b62b3b20ff5f16933f244392a40589f699ffbd1989def764
SHA5127f47dc1c0cb2cab59546be6099091757e97c8568be3c480cfca34ac29766e6ab87815c41cc2445910c9783e7ab9746a42296bc34f875d6f1ce054e795a581bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_CC847C1C687BCB4C6B5074DF051D733B
Filesize471B
MD5eb6bc101982368007ac3b34f486f6dcc
SHA168762c5224a2a52b4e3900c3caf42b3424313ab7
SHA256001eb218131094dbc95816dd35ccd6560a3163c9729f2a5fc2c59c088b5093b6
SHA51242852ac2e830a0f84489620618f4e1bd255b24c9d00f2c9952d3704516d7789e56f05aae116d7cf79751bce67a099153991abfa2ee1d4b202791544894c64d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_CD08734C3F770C014F2620E6CA4CE9C7
Filesize472B
MD56b5010acac3a2725f44ea906344866ff
SHA13ef75e7c28f48d14604283edc1a08c542a534933
SHA25603f0f283672755f5f41360b1d2261687492771933d7d1e00aee0447a5a918c29
SHA512ade01f0b56523ba9c9f044b57987a5b7785fc055cddf50ba1486e26ab05b11d6c96d1f87b360802edf421d545570e21a6e29cf488004b132db692ca3997af03e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5d5c21c39647f71b899b75070fa2f10c8
SHA1a96bf937068f3806dffbc0ab024ac4f16ec07d81
SHA256d8995adfae4c2da2e7a14de1d6bf6829af4002c0c9736fa8b0269bc976ae2ebb
SHA512dcb96e001480fdf9a8d81f0de0bbd7164232ea12e58482bb58c98713234d99b1a800abfb2b37601a449a1e43df1eb7437643a77fd7c93a4542cf8d0de6a145d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD579639f1d19fba6aeac911a2cd6accd01
SHA14a466c6deef1938f0f54ddc91e7079dcf7e92015
SHA256aad3c351ca0330a61bcc68f96158f0979570642cef7c4b228c121cda70f4c2c3
SHA5127dbdd472fe242246871eef41bf0b10efaee22d883eb981518b84fb4f89f4acda24a6c76cb8f5f4176d0410334019f0bfe3e11e587e295eabafc23ae22d9e1562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5ca8607684b3d65c27dd6e832f9b0fd14
SHA161366d148d4d060c9469b80c2a614966b12c1956
SHA25695a19f4c927cf1d54d5ece831d29c4c2772bf7712aac95e5631971cbfc3ea916
SHA512b89ab12fb4d52e61440a0fda64c436af604f5323be1285236ecfb4c164f52446c22b4efe5db07a41ce1af675c3c94c4344082a4b7e01d80496ba85a5ac270ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_CC847C1C687BCB4C6B5074DF051D733B
Filesize402B
MD595f915dbd084d7b1773aca81b6d8be30
SHA19b12fc00c68c8b4ed146452c921cafe6e82628f2
SHA25672c76a2f8886119f373ee52106a1eb1a61afb5f60285d564e32c34642947ab63
SHA5125b0765056e04ad7f2d2fd6afca8521d8d386ecfba30b83c8fec1f36f9965dc8f7f9dcc073ffbcba7bb9171334d753ba3900531372257b750ca92ff979c63f911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_CD08734C3F770C014F2620E6CA4CE9C7
Filesize398B
MD5e940135da0d612c950b9823f46489662
SHA190aa159dd618a84b4ae2af6b28f352c6a45747b4
SHA256fc7be9a88f45b0d19861f56fe1c02fc2c5fe78b654719ff64f4cbddb61b460f5
SHA512563ea40d03f28fb8317485d9710ec0f1a1831e11d694f349f8e24907475e8624449eb3e216c198f6927a53f202ddb1a33fa86b50ded893e7d8e1360a73bdba20
-
Filesize
53KB
MD501404e51f6442f60e478c306b1e6e52e
SHA137f234ccf5611b8309023410ceb9e76ad81f5678
SHA256d4356dd23aa2e811712132f9718786331661a1bd0d062c49cb76807b9563928b
SHA51294a9d843ae4055e2a9b412f03cba85e2d7b804ec3106f059d14ca50b15ae4acc6cd452f9461c2e21d1632d06848c969732c539aea17869b8b3a2f5ab93b891d7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
52KB
MD5faf341db23ab218989520cdb488bd287
SHA1dea8d00a028dbf3db1e4dc43c78f4953146a5512
SHA25631986b7f9a99a42e3d59c24fa9a3530f7436f99ed3c7651f04debd3f62c44a89
SHA51299bdfe35735c579102859774c3bd0809858d9628b3691ad4a9955016822139fe96f1921eed5d7dc57350faf6fbb4ba4f820278b04bb22ff88dcfefa2909da79f
-
Filesize
333KB
MD5d4d13386bf47d7fdea892ffafc3c8b42
SHA19e8364871a5618d3e481fe93979450b4450d4f07
SHA2568b6551ac3e6a95a424d9be1cb4032c8d72d6771a723245589e2caa51e412ff23
SHA512ae9d94ce9baad0bf22db3f7510855fca31564302263038262f38b3f86915ee64ff9851c5f0e7670a103e6851a1b06ec34071aff12477ca546e4cbb94ada8db31
-
C:\Users\Admin\AppData\Local\Temp\carinal\Coracosteon\c9f7cbb4a9e4e0db0e717cd71d3b5e5162544866bc7c74cde42fb9240cf193db.exe
Filesize1.2MB
MD5cfd68f7d943d702ade1744a68308f0ca
SHA17e7bb8ff7a01ace1cee4b93d087bfad75aaefa0c
SHA256c9f7cbb4a9e4e0db0e717cd71d3b5e5162544866bc7c74cde42fb9240cf193db
SHA5129a198311992a149e0974d2187be2838a3ed969d284e0722e5a3ddb576c80f0d8eaed6b25683f10ffff8ccfb6bcfcc58ae4ce95747ce8c24e8100387f13f3b7e6