Analysis
-
max time kernel
111s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 19:59
Behavioral task
behavioral1
Sample
GD7656780000.bat.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
GD7656780000.bat.exe
Resource
win10v2004-20241007-en
General
-
Target
GD7656780000.bat.exe
-
Size
628KB
-
MD5
1952368f897c22bc2f4ecf319f7ff331
-
SHA1
b5ce26cd9b5086a1ed7c3a2ad160a52b74b0943d
-
SHA256
c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc
-
SHA512
43d35629cebd5e2cc450d48d2f12bc4a51dee0d3800a7c43e5ed9641162dca87141f083a19888042ea61092ac07f58979d4764ce420fd28867a34918a5ea8168
-
SSDEEP
12288:6Ov5jKhsfoPA+yeVKUCUxP4C902bdRtJJPiCQ6qLB4A0L7LdNOkcw4:6q5TfcdHj4fmb6vkCkt4
Malware Config
Extracted
Protocol: smtp- Host:
mail.vvtrade.vn - Port:
587 - Username:
[email protected] - Password:
qVyP6qyv6MQCmZJBRs4t
Extracted
vipkeylogger
https://api.telegram.org/bot7339564661:AAFzTB6gEWMndjXYyD5LCn17UEBISRR8wDI/sendMessage?chat_id=6443825857
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\misruling.vbs misruling.exe -
Executes dropped EXE 1 IoCs
pid Process 1464 misruling.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svchost.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svchost.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 checkip.dyndns.org -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1404-14-0x0000000000DC0000-0x0000000000F2B000-memory.dmp autoit_exe behavioral2/memory/1464-22-0x00000000018F0000-0x0000000001CF0000-memory.dmp autoit_exe behavioral2/memory/1464-29-0x00000000002A0000-0x000000000040B000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1464 set thread context of 716 1464 misruling.exe 87 -
resource yara_rule behavioral2/memory/1404-0-0x0000000000DC0000-0x0000000000F2B000-memory.dmp upx behavioral2/files/0x000700000001e58a-10.dat upx behavioral2/memory/1464-11-0x00000000002A0000-0x000000000040B000-memory.dmp upx behavioral2/memory/1404-14-0x0000000000DC0000-0x0000000000F2B000-memory.dmp upx behavioral2/memory/1464-29-0x00000000002A0000-0x000000000040B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GD7656780000.bat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misruling.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 716 svchost.exe 716 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1464 misruling.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 716 svchost.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1404 GD7656780000.bat.exe 1404 GD7656780000.bat.exe 1464 misruling.exe 1464 misruling.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1404 GD7656780000.bat.exe 1404 GD7656780000.bat.exe 1464 misruling.exe 1464 misruling.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1404 wrote to memory of 1464 1404 GD7656780000.bat.exe 86 PID 1404 wrote to memory of 1464 1404 GD7656780000.bat.exe 86 PID 1404 wrote to memory of 1464 1404 GD7656780000.bat.exe 86 PID 1464 wrote to memory of 716 1464 misruling.exe 87 PID 1464 wrote to memory of 716 1464 misruling.exe 87 PID 1464 wrote to memory of 716 1464 misruling.exe 87 PID 1464 wrote to memory of 716 1464 misruling.exe 87 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svchost.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\GD7656780000.bat.exe"C:\Users\Admin\AppData\Local\Temp\GD7656780000.bat.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Archimago\misruling.exe"C:\Users\Admin\AppData\Local\Temp\GD7656780000.bat.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\GD7656780000.bat.exe"3⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
628KB
MD51952368f897c22bc2f4ecf319f7ff331
SHA1b5ce26cd9b5086a1ed7c3a2ad160a52b74b0943d
SHA256c6755c9510ba4df19d3a59b8112844e667ac84aa30d629e414b5612df243ecfc
SHA51243d35629cebd5e2cc450d48d2f12bc4a51dee0d3800a7c43e5ed9641162dca87141f083a19888042ea61092ac07f58979d4764ce420fd28867a34918a5ea8168