Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 02:13
Static task
static1
Behavioral task
behavioral1
Sample
23be2a96f4c15306083c180774452e11f42837e297627cd33ad5a9708953cd4c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
23be2a96f4c15306083c180774452e11f42837e297627cd33ad5a9708953cd4c.exe
Resource
win10v2004-20241007-en
General
-
Target
23be2a96f4c15306083c180774452e11f42837e297627cd33ad5a9708953cd4c.exe
-
Size
902KB
-
MD5
fa02056b1a21f75efabdda81219fb7db
-
SHA1
3e8dd711bfef09d2db54af75476765d85693c756
-
SHA256
23be2a96f4c15306083c180774452e11f42837e297627cd33ad5a9708953cd4c
-
SHA512
af4c4a9d7e6ede0026548136fa4b7c37f8298d055a835a56baf9795bc5b0b3a034a5e2dd2592476c3479fe8b23da338ad615144a91a61b3a47dd6bee00de8088
-
SSDEEP
24576:ZX22KSCC4VSi/kKJfaklq2E3l8Et2F2Yurik:9ylCQLJfaklc3uEtUWT
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
Logistica07 - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
msiexec.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
Processes:
msiexec.exeflow pid Process 19 2876 msiexec.exe 21 2876 msiexec.exe 23 2876 msiexec.exe 25 2876 msiexec.exe 28 2876 msiexec.exe 31 2876 msiexec.exe 33 2876 msiexec.exe 37 2876 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 30 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
msiexec.exepid Process 2876 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exemsiexec.exepid Process 4480 powershell.exe 2876 msiexec.exe -
Drops file in Windows directory 1 IoCs
Processes:
23be2a96f4c15306083c180774452e11f42837e297627cd33ad5a9708953cd4c.exedescription ioc Process File created C:\Windows\huzzah.lnk 23be2a96f4c15306083c180774452e11f42837e297627cd33ad5a9708953cd4c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
powershell.exemsiexec.exe23be2a96f4c15306083c180774452e11f42837e297627cd33ad5a9708953cd4c.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23be2a96f4c15306083c180774452e11f42837e297627cd33ad5a9708953cd4c.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exemsiexec.exepid Process 4480 powershell.exe 4480 powershell.exe 4480 powershell.exe 4480 powershell.exe 4480 powershell.exe 4480 powershell.exe 4480 powershell.exe 2876 msiexec.exe 2876 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid Process 4480 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
powershell.exemsiexec.exedescription pid Process Token: SeDebugPrivilege 4480 powershell.exe Token: SeIncreaseQuotaPrivilege 4480 powershell.exe Token: SeSecurityPrivilege 4480 powershell.exe Token: SeTakeOwnershipPrivilege 4480 powershell.exe Token: SeLoadDriverPrivilege 4480 powershell.exe Token: SeSystemProfilePrivilege 4480 powershell.exe Token: SeSystemtimePrivilege 4480 powershell.exe Token: SeProfSingleProcessPrivilege 4480 powershell.exe Token: SeIncBasePriorityPrivilege 4480 powershell.exe Token: SeCreatePagefilePrivilege 4480 powershell.exe Token: SeBackupPrivilege 4480 powershell.exe Token: SeRestorePrivilege 4480 powershell.exe Token: SeShutdownPrivilege 4480 powershell.exe Token: SeDebugPrivilege 4480 powershell.exe Token: SeSystemEnvironmentPrivilege 4480 powershell.exe Token: SeRemoteShutdownPrivilege 4480 powershell.exe Token: SeUndockPrivilege 4480 powershell.exe Token: SeManageVolumePrivilege 4480 powershell.exe Token: 33 4480 powershell.exe Token: 34 4480 powershell.exe Token: 35 4480 powershell.exe Token: 36 4480 powershell.exe Token: SeDebugPrivilege 2876 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
23be2a96f4c15306083c180774452e11f42837e297627cd33ad5a9708953cd4c.exepowershell.exedescription pid Process procid_target PID 3520 wrote to memory of 4480 3520 23be2a96f4c15306083c180774452e11f42837e297627cd33ad5a9708953cd4c.exe 82 PID 3520 wrote to memory of 4480 3520 23be2a96f4c15306083c180774452e11f42837e297627cd33ad5a9708953cd4c.exe 82 PID 3520 wrote to memory of 4480 3520 23be2a96f4c15306083c180774452e11f42837e297627cd33ad5a9708953cd4c.exe 82 PID 4480 wrote to memory of 2876 4480 powershell.exe 91 PID 4480 wrote to memory of 2876 4480 powershell.exe 91 PID 4480 wrote to memory of 2876 4480 powershell.exe 91 PID 4480 wrote to memory of 2876 4480 powershell.exe 91 -
outlook_office_path 1 IoCs
Processes:
msiexec.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
Processes:
msiexec.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23be2a96f4c15306083c180774452e11f42837e297627cd33ad5a9708953cd4c.exe"C:\Users\Admin\AppData\Local\Temp\23be2a96f4c15306083c180774452e11f42837e297627cd33ad5a9708953cd4c.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Bnkerkken=Get-Content -Raw 'C:\Users\Admin\AppData\Roaming\interpellant\stimulere\Chemosis\Suborbiculated.Amb';$Burhne=$Bnkerkken.SubString(72926,3);.$Burhne($Bnkerkken)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
317KB
MD5ed6a752afaab73e3a33d22575cb787b6
SHA11c358cbcba2041f9a7ea8f0083cb1f404c3d459f
SHA2561d4d52364eb7b2e04042e21d69aae9191875155491920a45b590abed8979cd11
SHA512484a6b62681858e6f1a8fb04ca58b83240bb7f7730822add1deb47b3737e7a3e4aee758d37c45944113296a21e6e0b78187c799e286bea7a4227ede75169f5b0
-
Filesize
71KB
MD5c5aa2dab45cc230922fae97020ebab32
SHA1a20e5e5e121c6bd952eb42a1ec04f81641d28b63
SHA2566dbad8626bf3199ee7b0b29ed5e63fd0a3435c50da9999acee9bb0996c0bc13d
SHA512caaf4d1cefe49a7509858fd59e96ffb7c7b3f7a210fc9d56ceeccd6594e77fdfe6f834f85e9d9e1c83ea9046b96987bdf1e8ee73a0047e39a32874448df50f57