Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-11-2024 10:04

General

  • Target

    9e29fdeaf847390ef0ac52a24dca3803eb3b7527e3ecb8c2c18bc337c7425a5e.exe

  • Size

    900KB

  • MD5

    57fcb286b01acc3318e455c23d5f857f

  • SHA1

    a01a9de8ed1dbd2dad4285748ed1eb2a4765f8d0

  • SHA256

    9e29fdeaf847390ef0ac52a24dca3803eb3b7527e3ecb8c2c18bc337c7425a5e

  • SHA512

    c4733810c9126435febedd867cee2c399044b491b72c09baa4f24e412b581f69490bd45576674eba99f406cf180a3dd4fe9bf07df1189106aced4204fb55b911

  • SSDEEP

    24576:7q0qQmN5TGwahM4GrYOkwm+HFY7aJVn7KiQ:7qamLtT50Ok8y7ajXQ

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Vipkeylogger family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e29fdeaf847390ef0ac52a24dca3803eb3b7527e3ecb8c2c18bc337c7425a5e.exe
    "C:\Users\Admin\AppData\Local\Temp\9e29fdeaf847390ef0ac52a24dca3803eb3b7527e3ecb8c2c18bc337c7425a5e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\9e29fdeaf847390ef0ac52a24dca3803eb3b7527e3ecb8c2c18bc337c7425a5e.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2744
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\zDAKFK.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2860
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zDAKFK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp196.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2960
    • C:\Users\Admin\AppData\Local\Temp\9e29fdeaf847390ef0ac52a24dca3803eb3b7527e3ecb8c2c18bc337c7425a5e.exe
      "C:\Users\Admin\AppData\Local\Temp\9e29fdeaf847390ef0ac52a24dca3803eb3b7527e3ecb8c2c18bc337c7425a5e.exe"
      2⤵
        PID:2768
      • C:\Users\Admin\AppData\Local\Temp\9e29fdeaf847390ef0ac52a24dca3803eb3b7527e3ecb8c2c18bc337c7425a5e.exe
        "C:\Users\Admin\AppData\Local\Temp\9e29fdeaf847390ef0ac52a24dca3803eb3b7527e3ecb8c2c18bc337c7425a5e.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2708

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp196.tmp

      Filesize

      1KB

      MD5

      9efa939ac608f0cedaddabc8dacecfd0

      SHA1

      df8cdc4594cd72f6c5c57b3336247fdb1a01792e

      SHA256

      af8cc1a6b3e41b9cce349ca6e6bfc45c9dd9daaa729be41f1373508b260576bd

      SHA512

      0f8982aa0ff9bc8221ba8dcdd75578a8315ba569294d96c46d53ba3d07331a70c43e372ddd93ed5de72b95daea83cba3e1da2a36c5888f0001293be24001fca6

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\8GL97GR3O7TI08S2D9QI.temp

      Filesize

      7KB

      MD5

      ea6d6dc19988ae9b537775aa6ca249c1

      SHA1

      ec79c1c25bd552488202777c857aa0076c9ffd33

      SHA256

      ff92161d207767ac06300ac71ec54885d39b0e495a254fbc9acaeb46bdc09bc1

      SHA512

      b4dac57ac71db4b9234bedfe3cce6f62ea29bb90c89570512a65d50eef008be987d8ce81939b66a011ab1af03f0f057bfaabcc29c8c09463f4a845ae7be303b8

    • memory/1292-4-0x0000000073F80000-0x000000007466E000-memory.dmp

      Filesize

      6.9MB

    • memory/1292-32-0x0000000073F80000-0x000000007466E000-memory.dmp

      Filesize

      6.9MB

    • memory/1292-0-0x0000000073F8E000-0x0000000073F8F000-memory.dmp

      Filesize

      4KB

    • memory/1292-5-0x0000000000550000-0x000000000056C000-memory.dmp

      Filesize

      112KB

    • memory/1292-6-0x00000000002E0000-0x000000000036C000-memory.dmp

      Filesize

      560KB

    • memory/1292-2-0x0000000073F80000-0x000000007466E000-memory.dmp

      Filesize

      6.9MB

    • memory/1292-1-0x0000000000FF0000-0x00000000010D6000-memory.dmp

      Filesize

      920KB

    • memory/1292-3-0x0000000073F8E000-0x0000000073F8F000-memory.dmp

      Filesize

      4KB

    • memory/2708-29-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/2708-31-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/2708-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2708-25-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/2708-23-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/2708-21-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/2708-19-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/2708-28-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB