Analysis

  • max time kernel
    143s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-11-2024 03:42

General

  • Target

    d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe

  • Size

    632KB

  • MD5

    95359158d57fb8ceb0093d85bdec58b4

  • SHA1

    50c7d83505c11307084313f5a6badb7dbf619b75

  • SHA256

    d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580

  • SHA512

    ab76232fb8252ed72f12c6ddef03b4cdfa729d89e9eb735e32d6a5bd9d202ab5b1690a0fdb28a36d345238ce3231b2789e75ae5a6e2d25af13cdbc6876a45cba

  • SSDEEP

    12288:ONBi378EzqgDY62EJNSGI4GoI2iJK06rNkRDjGQB7F0PgvD5Fb7q:ONg37HqO/hsGjIP4HNktGQMPgNpq

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Vipkeylogger family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe
    "C:\Users\Admin\AppData\Local\Temp\d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4464
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Paasknnelsers=Get-Content -raw 'C:\Users\Admin\AppData\Local\Skaberkrfters\Klembt\indgivelsers\Analytiske.Ant';$Besnrelsers=$Paasknnelsers.SubString(54211,3);.$Besnrelsers($Paasknnelsers)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Users\Admin\AppData\Local\Temp\Kvartsholdigt.exe
        "C:\Users\Admin\AppData\Local\Temp\Kvartsholdigt.exe"
        3⤵
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1228
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Paasknnelsers=Get-Content -raw 'C:\Users\Admin\AppData\Local\Skaberkrfters\Klembt\indgivelsers\Analytiske.Ant';$Besnrelsers=$Paasknnelsers.SubString(54211,3);.$Besnrelsers($Paasknnelsers)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1892
      • C:\Users\Admin\AppData\Local\Temp\Kvartsholdigt.exe
        "C:\Users\Admin\AppData\Local\Temp\Kvartsholdigt.exe"
        3⤵
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    854B

    MD5

    e935bc5762068caf3e24a2683b1b8a88

    SHA1

    82b70eb774c0756837fe8d7acbfeec05ecbf5463

    SHA256

    a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

    SHA512

    bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    d959db7594a86e638c0abed27a55261c

    SHA1

    657e766200a8729d161be376758c0f5e89783943

    SHA256

    f37f9d9cf90407b37178d68f16ec9d5df11b7b06a7a63dffc20784c14a161290

    SHA512

    78071f5e27cb73e71bde8afac316b483c93ef74b74bb989ce061a04d386635870910ba4eb8df951d7db74b6ae7a857009138ec05b01ca5df7e137a9f2c98b59d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_CC847C1C687BCB4C6B5074DF051D733B

    Filesize

    471B

    MD5

    8e3753e3859b5c76494a1f50f8612818

    SHA1

    756db726f63168098e836cbe4445e6b8f150f29d

    SHA256

    f881ac0b75e99792bc7f64f9619f435c9c4f0d1e1ab0b14cdb1e5787f33fd6c4

    SHA512

    3b9da62faf4a8dc701979b2cb18b28c52d270b459572db25229a67c138f4dddfec5f80df9b76038fda3a48815cd24bd7458b4bca0e31a8c528df4fbe8eb9536f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_CD08734C3F770C014F2620E6CA4CE9C7

    Filesize

    472B

    MD5

    2268d17aa64cee418bc4659167c367ef

    SHA1

    42493d1b9f13b2a21fddb5d238ac2ca4b0fa6c5d

    SHA256

    d5ee56d6bc6d33a989917fdf25e637540c988037d55970b7261fa4f5b0252081

    SHA512

    9608c7d2af9f1cfdc577cc644b3f5d1af178415148f956b1c825316d2eb4140180d5535aa79864584f878e8c2b1e31f2325ebad6e6efa2b310eac4c7544e040f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    170B

    MD5

    a0e6df701b0b3b3f0daff7f68afec819

    SHA1

    d16a8a7c499f08fa1820cbef58ab437fa6950ffa

    SHA256

    eee05c11d73f502ab3e6a84098395fa3348e54c47476cd58845d03f884e06a42

    SHA512

    b4f9e56d47e258d25e34a535102823bf4efcb59ab0c344f56f7f90dd4c9c923354651356f9df80e0a45074f9277aa5cb263e50310048e762c25ee15e66209345

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    ef4fd349078ae5e646334a9f9ed5fb9b

    SHA1

    789217db2de0352ae87d1a42c72d597ca9a21e04

    SHA256

    f54ba93c94fb70d8ebbb40ab2153f1005edc4785b2d27c263df09a64e5f685fa

    SHA512

    cedc596fa66afdc3c52f2ee5f6e064052c380bc72d75c278f960cc84530da07960847648f609576959507a768ab583c4e8c05be398d54b2db79fae0b2566b524

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_CC847C1C687BCB4C6B5074DF051D733B

    Filesize

    402B

    MD5

    ab85718b2f7428dc9c36716132ac1251

    SHA1

    c4bae39a5b4d49a451406ac723de055428bb3287

    SHA256

    da8e3ede328e4c61228f8bdf9cf231302d8a3c8e3d046d29f3c1bc0827476fab

    SHA512

    df980d2199380bf75e65d4a28e908639247ff487c3a39dc102efb8fb5be6b468842414a3bc767513272467d6d58acb57b05281851d56ed863bd6b270d8f2be89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_CD08734C3F770C014F2620E6CA4CE9C7

    Filesize

    398B

    MD5

    c46b605949e7eb4b14719bc4a315a5c6

    SHA1

    0632f7da7a3998bad5cdaeef7b5f84b534e995eb

    SHA256

    d21ad0fbaf427f094b60387f6c2cd4afedf3e732949dbdc90661bcd134c62ee7

    SHA512

    f31f854183a3cd84ed132917a34ded733758624a954ea905ce16cd1db1cad416b0e75a13545653575dcb17d7d88598fb7cd2598ed75f4c148d7a8903981bd197

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

    Filesize

    53KB

    MD5

    01404e51f6442f60e478c306b1e6e52e

    SHA1

    37f234ccf5611b8309023410ceb9e76ad81f5678

    SHA256

    d4356dd23aa2e811712132f9718786331661a1bd0d062c49cb76807b9563928b

    SHA512

    94a9d843ae4055e2a9b412f03cba85e2d7b804ec3106f059d14ca50b15ae4acc6cd452f9461c2e21d1632d06848c969732c539aea17869b8b3a2f5ab93b891d7

  • C:\Users\Admin\AppData\Local\Skaberkrfters\Klembt\indgivelsers\Analytiske.Ant

    Filesize

    52KB

    MD5

    64473712892d67203242c7904c6ffd81

    SHA1

    72d869d49607487d0ae85da693aacc42709339e2

    SHA256

    9c845196deca4a4738d5bee70cc2169f1dbec420b7d340b5d40642a41287a9a6

    SHA512

    0c8ad907a17bda49371ebca2c4d390347c99c48c13c10c245691113aa087b3ea65fb0811ea623dcd4257f3cc0eca1615ce40d5e2b1cda623356a84e9c18b0383

  • C:\Users\Admin\AppData\Local\Skaberkrfters\Klembt\indgivelsers\Organicistic250.Chr

    Filesize

    294KB

    MD5

    b5f809a8b08fd670917313e4d416c4ee

    SHA1

    45a52e67f166760cd53459eb4cddf127315e7e36

    SHA256

    8c07edc80c8f3ef9ad5a55153ad7b81eb2f2cf14760570f137ae62be70bd5567

    SHA512

    49adde8650a72f8838e181ee317a0339f334b206e558e1499f933cbe66fbb32501745ffb4cea25c47d8808a4619996a4e45293acaf8792a87a7cda1afb450d75

  • C:\Users\Admin\AppData\Local\Temp\Kvartsholdigt.exe

    Filesize

    632KB

    MD5

    95359158d57fb8ceb0093d85bdec58b4

    SHA1

    50c7d83505c11307084313f5a6badb7dbf619b75

    SHA256

    d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580

    SHA512

    ab76232fb8252ed72f12c6ddef03b4cdfa729d89e9eb735e32d6a5bd9d202ab5b1690a0fdb28a36d345238ce3231b2789e75ae5a6e2d25af13cdbc6876a45cba

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_enpkwtgx.0au.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1228-135-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/1488-138-0x0000000000480000-0x00000000004C8000-memory.dmp

    Filesize

    288KB

  • memory/1488-136-0x0000000000480000-0x00000000016D4000-memory.dmp

    Filesize

    18.3MB

  • memory/1488-139-0x0000000024070000-0x000000002410C000-memory.dmp

    Filesize

    624KB

  • memory/1488-143-0x0000000024B50000-0x0000000024D12000-memory.dmp

    Filesize

    1.8MB

  • memory/1488-144-0x0000000024D20000-0x0000000024D70000-memory.dmp

    Filesize

    320KB

  • memory/1488-147-0x0000000024DD0000-0x0000000024E62000-memory.dmp

    Filesize

    584KB

  • memory/1488-148-0x0000000024EA0000-0x0000000024EAA000-memory.dmp

    Filesize

    40KB

  • memory/1892-72-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/1892-37-0x0000000005A50000-0x0000000005A9C000-memory.dmp

    Filesize

    304KB

  • memory/1892-7-0x0000000004440000-0x0000000004476000-memory.dmp

    Filesize

    216KB

  • memory/1892-8-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/1892-9-0x0000000004BB0000-0x00000000051D8000-memory.dmp

    Filesize

    6.2MB

  • memory/1892-57-0x0000000006EB0000-0x0000000006ECE000-memory.dmp

    Filesize

    120KB

  • memory/1892-45-0x0000000070020000-0x000000007006C000-memory.dmp

    Filesize

    304KB

  • memory/1892-15-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/1892-14-0x00000000053C0000-0x0000000005426000-memory.dmp

    Filesize

    408KB

  • memory/1892-44-0x0000000006E70000-0x0000000006EA2000-memory.dmp

    Filesize

    200KB

  • memory/1892-74-0x0000000007060000-0x0000000007084000-memory.dmp

    Filesize

    144KB

  • memory/1892-73-0x0000000007030000-0x000000000705A000-memory.dmp

    Filesize

    168KB

  • memory/1892-13-0x0000000005350000-0x00000000053B6000-memory.dmp

    Filesize

    408KB

  • memory/1892-12-0x0000000004950000-0x0000000004972000-memory.dmp

    Filesize

    136KB

  • memory/1892-46-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/1892-26-0x0000000005430000-0x0000000005784000-memory.dmp

    Filesize

    3.3MB

  • memory/1892-80-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/1892-25-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/1892-36-0x0000000005A30000-0x0000000005A4E000-memory.dmp

    Filesize

    120KB

  • memory/1892-84-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/1892-47-0x00000000707A0000-0x0000000070AF4000-memory.dmp

    Filesize

    3.3MB

  • memory/1892-85-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/1892-86-0x0000000008350000-0x000000000C413000-memory.dmp

    Filesize

    64.8MB

  • memory/1892-88-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/1892-38-0x0000000006A50000-0x0000000006AE6000-memory.dmp

    Filesize

    600KB

  • memory/1892-90-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/1892-91-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/1892-40-0x0000000005F80000-0x0000000005FA2000-memory.dmp

    Filesize

    136KB

  • memory/1892-41-0x00000000070A0000-0x0000000007644000-memory.dmp

    Filesize

    5.6MB

  • memory/1892-39-0x0000000005F10000-0x0000000005F2A000-memory.dmp

    Filesize

    104KB

  • memory/1892-100-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/2652-6-0x0000000073B9E000-0x0000000073B9F000-memory.dmp

    Filesize

    4KB

  • memory/2652-43-0x0000000008510000-0x0000000008B8A000-memory.dmp

    Filesize

    6.5MB

  • memory/2652-89-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/2652-82-0x0000000073B9E000-0x0000000073B9F000-memory.dmp

    Filesize

    4KB

  • memory/2652-101-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/2652-81-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/2652-92-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/2652-11-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/2652-83-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/2652-75-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/2652-70-0x0000000007850000-0x000000000785A000-memory.dmp

    Filesize

    40KB

  • memory/2652-71-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/2652-10-0x0000000073B90000-0x0000000074340000-memory.dmp

    Filesize

    7.7MB

  • memory/2652-69-0x0000000007720000-0x00000000077C3000-memory.dmp

    Filesize

    652KB

  • memory/2652-59-0x00000000707A0000-0x0000000070AF4000-memory.dmp

    Filesize

    3.3MB

  • memory/2652-58-0x0000000070020000-0x000000007006C000-memory.dmp

    Filesize

    304KB