Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 15:24
Static task
static1
Behavioral task
behavioral1
Sample
YKBGunlukEkstre.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
YKBGunlukEkstre.exe
Resource
win10v2004-20241007-en
General
-
Target
YKBGunlukEkstre.exe
-
Size
2.9MB
-
MD5
8866c07b36f379aebfabee79b0f263ac
-
SHA1
db1121a0e6cd16ffc6e5a05a278849858aee2841
-
SHA256
a3011ad648631ad2cac00f423cb3d5c6a35b94a26b5975890b2c7471dd4fd503
-
SHA512
8d8e8d4197af67dc10451018edb98ec911958624c5de99044aaed0bc8637ab9319ae65b5f50add058f4e4a781de72782cc22f1907ccc92ab0b2fadb68456ffd6
-
SSDEEP
12288:1qg/g+A9KxFXIXNPR+LoyI8ViqCLZ/HhGYpwdc0D+sK:FtcK7I9PYZCLNYZO0D1K
Malware Config
Extracted
Protocol: ftp- Host:
ftp.akguneselektrik.com - Port:
21 - Username:
akgunes - Password:
9H5xQVGg
Extracted
vipkeylogger
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CasPol.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CasPol.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CasPol.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2012 set thread context of 2160 2012 YKBGunlukEkstre.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2160 CasPol.exe 2160 CasPol.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2160 CasPol.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2160 2012 YKBGunlukEkstre.exe 31 PID 2012 wrote to memory of 2160 2012 YKBGunlukEkstre.exe 31 PID 2012 wrote to memory of 2160 2012 YKBGunlukEkstre.exe 31 PID 2012 wrote to memory of 2160 2012 YKBGunlukEkstre.exe 31 PID 2012 wrote to memory of 2160 2012 YKBGunlukEkstre.exe 31 PID 2012 wrote to memory of 2160 2012 YKBGunlukEkstre.exe 31 PID 2012 wrote to memory of 2160 2012 YKBGunlukEkstre.exe 31 PID 2012 wrote to memory of 2160 2012 YKBGunlukEkstre.exe 31 PID 2012 wrote to memory of 2160 2012 YKBGunlukEkstre.exe 31 PID 2012 wrote to memory of 2124 2012 YKBGunlukEkstre.exe 32 PID 2012 wrote to memory of 2124 2012 YKBGunlukEkstre.exe 32 PID 2012 wrote to memory of 2124 2012 YKBGunlukEkstre.exe 32 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CasPol.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 CasPol.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\YKBGunlukEkstre.exe"C:\Users\Admin\AppData\Local\Temp\YKBGunlukEkstre.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2160
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2012 -s 7282⤵PID:2124
-