Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 08:37
Static task
static1
Behavioral task
behavioral1
Sample
JUSTIFICANTEPAGOFRASNOVIEMBRE2024.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JUSTIFICANTEPAGOFRASNOVIEMBRE2024.exe
Resource
win10v2004-20241007-en
General
-
Target
JUSTIFICANTEPAGOFRASNOVIEMBRE2024.exe
-
Size
580KB
-
MD5
d344b966541bacdcd4e8df8487b8e5e9
-
SHA1
1e3d2286ede527fe7662c4fba9f2534c3ee129ef
-
SHA256
ebac7c8cd5045f76ed8f27f50eaa9c1734560bf4d9b398d81ab0ccd1c5af9e49
-
SHA512
c38716e6196505b83d5111ad1916f3efd13a60084eb7c123552b6c0ee68e0ec93e6219e58818272653c4c6ef178c502a62cf6c9ae31b211924d0c8c96d4689c1
-
SSDEEP
12288:1kuicZeIuXpkqtAb/N7sATEc+LKM4LK/mySMpQKz:NicgIDG04An+LKM4LjGnz
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
JA-*2020antonio - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
msiexec.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
Processes:
msiexec.exeflow pid Process 22 2160 msiexec.exe 24 2160 msiexec.exe 26 2160 msiexec.exe 28 2160 msiexec.exe 30 2160 msiexec.exe 35 2160 msiexec.exe 39 2160 msiexec.exe 50 2160 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 34 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
msiexec.exepid Process 2160 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exemsiexec.exepid Process 3800 powershell.exe 2160 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
JUSTIFICANTEPAGOFRASNOVIEMBRE2024.exepowershell.exemsiexec.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JUSTIFICANTEPAGOFRASNOVIEMBRE2024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exemsiexec.exepid Process 3800 powershell.exe 3800 powershell.exe 3800 powershell.exe 3800 powershell.exe 3800 powershell.exe 3800 powershell.exe 3800 powershell.exe 2160 msiexec.exe 2160 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid Process 3800 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
powershell.exemsiexec.exedescription pid Process Token: SeDebugPrivilege 3800 powershell.exe Token: SeIncreaseQuotaPrivilege 3800 powershell.exe Token: SeSecurityPrivilege 3800 powershell.exe Token: SeTakeOwnershipPrivilege 3800 powershell.exe Token: SeLoadDriverPrivilege 3800 powershell.exe Token: SeSystemProfilePrivilege 3800 powershell.exe Token: SeSystemtimePrivilege 3800 powershell.exe Token: SeProfSingleProcessPrivilege 3800 powershell.exe Token: SeIncBasePriorityPrivilege 3800 powershell.exe Token: SeCreatePagefilePrivilege 3800 powershell.exe Token: SeBackupPrivilege 3800 powershell.exe Token: SeRestorePrivilege 3800 powershell.exe Token: SeShutdownPrivilege 3800 powershell.exe Token: SeDebugPrivilege 3800 powershell.exe Token: SeSystemEnvironmentPrivilege 3800 powershell.exe Token: SeRemoteShutdownPrivilege 3800 powershell.exe Token: SeUndockPrivilege 3800 powershell.exe Token: SeManageVolumePrivilege 3800 powershell.exe Token: 33 3800 powershell.exe Token: 34 3800 powershell.exe Token: 35 3800 powershell.exe Token: 36 3800 powershell.exe Token: SeDebugPrivilege 2160 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
JUSTIFICANTEPAGOFRASNOVIEMBRE2024.exepowershell.exedescription pid Process procid_target PID 4380 wrote to memory of 3800 4380 JUSTIFICANTEPAGOFRASNOVIEMBRE2024.exe 82 PID 4380 wrote to memory of 3800 4380 JUSTIFICANTEPAGOFRASNOVIEMBRE2024.exe 82 PID 4380 wrote to memory of 3800 4380 JUSTIFICANTEPAGOFRASNOVIEMBRE2024.exe 82 PID 3800 wrote to memory of 2160 3800 powershell.exe 91 PID 3800 wrote to memory of 2160 3800 powershell.exe 91 PID 3800 wrote to memory of 2160 3800 powershell.exe 91 PID 3800 wrote to memory of 2160 3800 powershell.exe 91 -
outlook_office_path 1 IoCs
Processes:
msiexec.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
Processes:
msiexec.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JUSTIFICANTEPAGOFRASNOVIEMBRE2024.exe"C:\Users\Admin\AppData\Local\Temp\JUSTIFICANTEPAGOFRASNOVIEMBRE2024.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Studiepladsernes=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\Lysstraales\Genoversat\lirens\Scourged.Afl';$Viljekraftens=$Studiepladsernes.SubString(11694,3);.$Viljekraftens($Studiepladsernes)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2160
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
346KB
MD55d3d1c39210847fc1d4ae76b2272a8f4
SHA188b4f7bba955a4eabaffea4689806b8d409be5ee
SHA25604588cf44f89229f0b94e58b3203909c53cfe076062c3bd1844268924c12d289
SHA512497df70f2bdb5c64ac5ab5d06486e1241cf58a76c9c4d501682e5c659d73ddd9bac15c8be45cc5e39021cdcf98592efa1c2aa02e4d1ccc42ae5911d29aecc085
-
Filesize
70KB
MD5daed86cf08d9bb9cd6ecb4738054b4bf
SHA1dccb735db3c40e005b405719a7e7fbffbabd4266
SHA256b2b48b891fda2d469556c1b554de00c8d6259e04749961ed80376d1f1b2976f0
SHA512f881ca1571ba0e4a770318865d176c1cb3ec1b842df11c12935617406c27abc308c24928ec3c0c1f3fb32c8947fd796e9c118ee04b3b279da36e3ecffd711c1c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82