Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 19:02
Static task
static1
Behavioral task
behavioral1
Sample
f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe
Resource
win10v2004-20241007-en
General
-
Target
f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe
-
Size
699KB
-
MD5
c684a63e08404601807c7bd5af233d28
-
SHA1
d9607463fcf1ce55eb8e5649b65047ee526d8060
-
SHA256
f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621
-
SHA512
ffd030b446965e404fd7b76bf2839a9dd620b4c1ded7e82c6b02f277219514de0489059617bc2ca5b560c767b401630d0b2d34ec056df514771a563a8e0f46cd
-
SSDEEP
12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLxwxhzZ:ffmMv6Ckr7Mny5QLxwxhV
Malware Config
Extracted
xworm
3.1
69.174.99.6:7000
ZMMi52bfIGvYY0Ok
-
install_file
USB.exe
Extracted
vipkeylogger
https://api.telegram.org/bot7721085569:AAH1tkciy-nKykIEUNjOAUsItTcvNCVmFLo/sendMessage?chat_id=6236275763
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/2744-30-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2744-32-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2744-34-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Xworm family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\starbowlines.vbs starbowlines.exe -
Executes dropped EXE 2 IoCs
pid Process 2804 starbowlines.exe 1288 ipwiyf.scr -
Loads dropped DLL 2 IoCs
pid Process 2648 f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe 2744 RegSvcs.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 checkip.dyndns.org -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000017472-12.dat autoit_exe behavioral1/files/0x00080000000174a2-40.dat autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2804 set thread context of 2744 2804 starbowlines.exe 31 PID 1288 set thread context of 2944 1288 ipwiyf.scr 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipwiyf.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language starbowlines.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2944 RegSvcs.exe 2944 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2804 starbowlines.exe 1288 ipwiyf.scr -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2744 RegSvcs.exe Token: SeDebugPrivilege 2944 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2804 2648 f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe 30 PID 2648 wrote to memory of 2804 2648 f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe 30 PID 2648 wrote to memory of 2804 2648 f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe 30 PID 2648 wrote to memory of 2804 2648 f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe 30 PID 2804 wrote to memory of 2744 2804 starbowlines.exe 31 PID 2804 wrote to memory of 2744 2804 starbowlines.exe 31 PID 2804 wrote to memory of 2744 2804 starbowlines.exe 31 PID 2804 wrote to memory of 2744 2804 starbowlines.exe 31 PID 2804 wrote to memory of 2744 2804 starbowlines.exe 31 PID 2804 wrote to memory of 2744 2804 starbowlines.exe 31 PID 2804 wrote to memory of 2744 2804 starbowlines.exe 31 PID 2804 wrote to memory of 2744 2804 starbowlines.exe 31 PID 2744 wrote to memory of 1288 2744 RegSvcs.exe 34 PID 2744 wrote to memory of 1288 2744 RegSvcs.exe 34 PID 2744 wrote to memory of 1288 2744 RegSvcs.exe 34 PID 2744 wrote to memory of 1288 2744 RegSvcs.exe 34 PID 1288 wrote to memory of 2944 1288 ipwiyf.scr 35 PID 1288 wrote to memory of 2944 1288 ipwiyf.scr 35 PID 1288 wrote to memory of 2944 1288 ipwiyf.scr 35 PID 1288 wrote to memory of 2944 1288 ipwiyf.scr 35 PID 1288 wrote to memory of 2944 1288 ipwiyf.scr 35 PID 1288 wrote to memory of 2944 1288 ipwiyf.scr 35 PID 1288 wrote to memory of 2944 1288 ipwiyf.scr 35 PID 1288 wrote to memory of 2944 1288 ipwiyf.scr 35 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe"C:\Users\Admin\AppData\Local\Temp\f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\anaboly\starbowlines.exe"C:\Users\Admin\AppData\Local\Temp\f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\ipwiyf.scr"C:\Users\Admin\AppData\Local\Temp\ipwiyf.scr" /S4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\ipwiyf.scr" /S5⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2944
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5d15f30aadcae7f87307e63e039228866
SHA161d3595411a9a2ff483a5e1b5a359ca7868d1f5a
SHA25625ae69f8d71da3dbcde420c9a0abf90bbce046c27969580b2a37e289ce9b6205
SHA51225e6801408e24b6c5a2472ed7218ff9a7e272b2b1747a9c2a7eb7ed40223649589daac713c08fe8015df89b5d0da176188345edcfbd0ef56e3a4151b12467fa0
-
Filesize
29KB
MD5a2a9ce81977085a400789d49db0f0250
SHA13ebe1a79d42e3bda77030fa6b26740bd7a287691
SHA2564a3071b8298eb6dbc10141a491909fa7c726d68bc5721581587b09797e16bc58
SHA5120919addf21283224eb83353d7f7a3e8ff62047699ab97bb3ac57a0aafe51e397465ef1be30808ff20b6b5e8a12a5a2000dfa76db6557b3f258bfc7c1c59082dc
-
Filesize
28KB
MD5047bb03b304822bed7f32550438d63b4
SHA18c393608d386dc29c90337370a39843acf39d7ce
SHA25687939add59166c199e246e8c761a0dfb8028f5f9b6e3f54895d9391c17f8dc17
SHA51235ef5949244e89c0b1cc2f1d4d54cba66a5e1356c0d68d333cb9e399539d8d008f9aa1b3c9782b48b7adc5d1724b1a33622ed08c1adb3ed5a6486b97e679dc07
-
Filesize
785KB
MD58d46e55973af1de9d60320eab1ea1fa2
SHA12b6e1e250f5601308ab09a8a5f5ad78b78c33985
SHA25686865a4fa894a64051e0bd9134851d148576c2fc3b49e0621fb04553bb5632f5
SHA512b51f517918b9b98a6d1720a73f02401e47bc4e9459ae316fcfdaa9eac300dfe873b6d775fb01f53fbd5547352de265a52d95700dc5470d604b1b2bb23840f029
-
Filesize
699KB
MD5c684a63e08404601807c7bd5af233d28
SHA1d9607463fcf1ce55eb8e5649b65047ee526d8060
SHA256f0045c024fc4e796911fa5a1e597c22f011723c8301c4a903dc140699a707621
SHA512ffd030b446965e404fd7b76bf2839a9dd620b4c1ded7e82c6b02f277219514de0489059617bc2ca5b560c767b401630d0b2d34ec056df514771a563a8e0f46cd