Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 17:48
Static task
static1
Behavioral task
behavioral1
Sample
INV-0542.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
INV-0542.pdf.exe
Resource
win10v2004-20241007-en
General
-
Target
INV-0542.pdf.exe
-
Size
902KB
-
MD5
fa02056b1a21f75efabdda81219fb7db
-
SHA1
3e8dd711bfef09d2db54af75476765d85693c756
-
SHA256
23be2a96f4c15306083c180774452e11f42837e297627cd33ad5a9708953cd4c
-
SHA512
af4c4a9d7e6ede0026548136fa4b7c37f8298d055a835a56baf9795bc5b0b3a034a5e2dd2592476c3479fe8b23da338ad615144a91a61b3a47dd6bee00de8088
-
SSDEEP
24576:ZX22KSCC4VSi/kKJfaklq2E3l8Et2F2Yurik:9ylCQLJfaklc3uEtUWT
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
Logistica07 - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
msiexec.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
Processes:
msiexec.exeflow pid Process 19 1616 msiexec.exe 21 1616 msiexec.exe 24 1616 msiexec.exe 28 1616 msiexec.exe 30 1616 msiexec.exe 34 1616 msiexec.exe 36 1616 msiexec.exe 40 1616 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 33 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
msiexec.exepid Process 1616 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exemsiexec.exepid Process 2312 powershell.exe 1616 msiexec.exe -
Drops file in Windows directory 1 IoCs
Processes:
INV-0542.pdf.exedescription ioc Process File created C:\Windows\huzzah.lnk INV-0542.pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
powershell.exemsiexec.exeINV-0542.pdf.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INV-0542.pdf.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exemsiexec.exepid Process 2312 powershell.exe 2312 powershell.exe 2312 powershell.exe 2312 powershell.exe 2312 powershell.exe 2312 powershell.exe 2312 powershell.exe 1616 msiexec.exe 1616 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid Process 2312 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
powershell.exemsiexec.exedescription pid Process Token: SeDebugPrivilege 2312 powershell.exe Token: SeIncreaseQuotaPrivilege 2312 powershell.exe Token: SeSecurityPrivilege 2312 powershell.exe Token: SeTakeOwnershipPrivilege 2312 powershell.exe Token: SeLoadDriverPrivilege 2312 powershell.exe Token: SeSystemProfilePrivilege 2312 powershell.exe Token: SeSystemtimePrivilege 2312 powershell.exe Token: SeProfSingleProcessPrivilege 2312 powershell.exe Token: SeIncBasePriorityPrivilege 2312 powershell.exe Token: SeCreatePagefilePrivilege 2312 powershell.exe Token: SeBackupPrivilege 2312 powershell.exe Token: SeRestorePrivilege 2312 powershell.exe Token: SeShutdownPrivilege 2312 powershell.exe Token: SeDebugPrivilege 2312 powershell.exe Token: SeSystemEnvironmentPrivilege 2312 powershell.exe Token: SeRemoteShutdownPrivilege 2312 powershell.exe Token: SeUndockPrivilege 2312 powershell.exe Token: SeManageVolumePrivilege 2312 powershell.exe Token: 33 2312 powershell.exe Token: 34 2312 powershell.exe Token: 35 2312 powershell.exe Token: 36 2312 powershell.exe Token: SeDebugPrivilege 1616 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
INV-0542.pdf.exepowershell.exedescription pid Process procid_target PID 3808 wrote to memory of 2312 3808 INV-0542.pdf.exe 82 PID 3808 wrote to memory of 2312 3808 INV-0542.pdf.exe 82 PID 3808 wrote to memory of 2312 3808 INV-0542.pdf.exe 82 PID 2312 wrote to memory of 1616 2312 powershell.exe 89 PID 2312 wrote to memory of 1616 2312 powershell.exe 89 PID 2312 wrote to memory of 1616 2312 powershell.exe 89 PID 2312 wrote to memory of 1616 2312 powershell.exe 89 -
outlook_office_path 1 IoCs
Processes:
msiexec.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
Processes:
msiexec.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\INV-0542.pdf.exe"C:\Users\Admin\AppData\Local\Temp\INV-0542.pdf.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Bnkerkken=Get-Content -Raw 'C:\Users\Admin\AppData\Roaming\interpellant\stimulere\Chemosis\Suborbiculated.Amb';$Burhne=$Bnkerkken.SubString(72926,3);.$Burhne($Bnkerkken)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
317KB
MD5ed6a752afaab73e3a33d22575cb787b6
SHA11c358cbcba2041f9a7ea8f0083cb1f404c3d459f
SHA2561d4d52364eb7b2e04042e21d69aae9191875155491920a45b590abed8979cd11
SHA512484a6b62681858e6f1a8fb04ca58b83240bb7f7730822add1deb47b3737e7a3e4aee758d37c45944113296a21e6e0b78187c799e286bea7a4227ede75169f5b0
-
Filesize
71KB
MD5c5aa2dab45cc230922fae97020ebab32
SHA1a20e5e5e121c6bd952eb42a1ec04f81641d28b63
SHA2566dbad8626bf3199ee7b0b29ed5e63fd0a3435c50da9999acee9bb0996c0bc13d
SHA512caaf4d1cefe49a7509858fd59e96ffb7c7b3f7a210fc9d56ceeccd6594e77fdfe6f834f85e9d9e1c83ea9046b96987bdf1e8ee73a0047e39a32874448df50f57