Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2024 16:06

General

  • Target

    125b4582b7dd2221044fb257f580da57e4dc61b03a6c35e208fed973f71c28a1.exe

  • Size

    859KB

  • MD5

    47fd98348b7d314e4e9dae46e5f1e1a1

  • SHA1

    cafe48404707e61235bfbe6646d8072af4298e21

  • SHA256

    125b4582b7dd2221044fb257f580da57e4dc61b03a6c35e208fed973f71c28a1

  • SHA512

    8a1deda7d7e8e80d8b2e62ad0d9d4400b1d865ea322955e577fc439a8a0f1d6d3cb912397ecb6458941fd7fd566c1fdbdf4c4ed02c72234fa543bfcb45db845a

  • SSDEEP

    12288:l9/IyjazmRR+BZhOLlpJjdCPwwdw6ETeVlCE7vkQymGwSW01hXqvjoaCi7lnsZzz:/A/KqZhOnJdyzp+alCJmvulW6Nd0vo

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.ionos.es
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    pW@4G()=#2

Extracted

Family

vipkeylogger

Credentials

Signatures

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Vipkeylogger family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Blocklisted process makes network request 14 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\125b4582b7dd2221044fb257f580da57e4dc61b03a6c35e208fed973f71c28a1.exe
    "C:\Users\Admin\AppData\Local\Temp\125b4582b7dd2221044fb257f580da57e4dc61b03a6c35e208fed973f71c28a1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Sensitometer42=Get-Content -raw 'C:\Users\Admin\AppData\Roaming\underarmsmusklens\Edriophthalmian\Paraffinerer.Dej';$Loveliest=$Sensitometer42.SubString(55162,3);.$Loveliest($Sensitometer42)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\SysWOW64\msiexec.exe"
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        PID:4644
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 1648
          4⤵
          • Program crash
          PID:1572
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Sensitometer42=Get-Content -raw 'C:\Users\Admin\AppData\Roaming\underarmsmusklens\Edriophthalmian\Paraffinerer.Dej';$Loveliest=$Sensitometer42.SubString(55162,3);.$Loveliest($Sensitometer42)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\SysWOW64\msiexec.exe"
        3⤵
        • Accesses Microsoft Outlook profiles
        • Blocklisted process makes network request
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:748
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4644 -ip 4644
    1⤵
      PID:1868

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

      Filesize

      854B

      MD5

      e935bc5762068caf3e24a2683b1b8a88

      SHA1

      82b70eb774c0756837fe8d7acbfeec05ecbf5463

      SHA256

      a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

      SHA512

      bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      1KB

      MD5

      088d20c82658eef1be809a469818581c

      SHA1

      65bfd418b78ab4377f01190777a927cba52d0b22

      SHA256

      93875d306db3166550ff3d7bba6f9389b6bd24c0d21209b135bcd7186a0e0828

      SHA512

      71c73ad59cbfb8b41aa6473cb67665251585beb3a44fdfa1d1b09ed81ebd96705e9fb3b274d8b5b01ea49b2c5b0ea6280704fa2b520137f14131833836f76247

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_841DF67C840691A847835C0F760B4DC0

      Filesize

      471B

      MD5

      f37dbfcbf1830fac18f80eb21b3ade98

      SHA1

      e578fedc38c9c14903ce91a63e9f003d71a0702f

      SHA256

      2ed9f20e1926124ff2136b1b84aa7894483e423f54952fa44d30e2ec3d8091b1

      SHA512

      78fe08c3eefc803c81d86442a698bfb02a5e0b73d9baeb29c5074dca06ccab6ba3c6d0fbe822524c730261dfa3abee991ea62c6fefb41aa8ab3140ffcc00d756

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_BB4872F70FE9CD99D6AAFAAAA12FAF2E

      Filesize

      472B

      MD5

      fa4734f680f1131f6a5bf2779c41fe5f

      SHA1

      3e20ebc4cdc0b9f4f150860e99a5e3c1c5cc6f07

      SHA256

      f51c86734c729964f753d41bcf9d700440db3016910449fabbd1f8140bb376ec

      SHA512

      baf5cad957a1a3243719a8268cd60e3bc31f428b6f01492497b8449d7590b1152285ad05e773fd3907d06bfe21262561c3c5fc0005e6f5f8ab959f3e21179935

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

      Filesize

      170B

      MD5

      463b95a7ad66db9dcc7b68e589a2f5b0

      SHA1

      ee41ccd732eb55df634ad22a321a3b4c6ae265d5

      SHA256

      b15473d91e74d0b8bd8e7319df9695427840b91edcdddd050ca69e9b3339583d

      SHA512

      1869bc795a51d038f5714996dad374e06ab2df6c263f9047fdbca5023fa33a54f7aea785db3d4cc54cdcfc44d2497076994da2a3ad24d00b75cdd2a9ee519060

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      7fd10707beb3296972de8a6e6f7686fe

      SHA1

      1772f200560cc832e185ab0f9b2b22d4520f999d

      SHA256

      e2e11cfce152d845005e87385e2570194175592e651f3b05f77380c56a0ffec2

      SHA512

      ab7e36410d688248e6494cabf9309615aa947876c0d1eb05129760f51cd12aa0cceb8d7086ff885874d1575ee29833792f156f99a695e8a1c669171636157153

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_841DF67C840691A847835C0F760B4DC0

      Filesize

      402B

      MD5

      ad1bef5dbf5d400660875864d0cc3a75

      SHA1

      582a4536eb60c29ee3ddaa352bd987546338bf9d

      SHA256

      7ba7f648aac7d663c65958752521b78c0f32bd068da459c47d60219a8f75c97e

      SHA512

      1884fe6386ed1513b286f4edda9fcdc7dd0c08368eb57436fa5e054eaeb61aeb4ee248f7fcda2ab391b989a6bc261bd8796dde93c7127a51d8c5faec1d80be54

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_BB4872F70FE9CD99D6AAFAAAA12FAF2E

      Filesize

      398B

      MD5

      da648d070fb165d36ad84224efa34ec8

      SHA1

      48a2288cda30de767a3e94cced195f3dfae54636

      SHA256

      d112809b5c70e7290f44c1ece8b500087450a51e424a1b34d1e713974a957945

      SHA512

      da401793050bda1f0f455d123b3e098d187b3f53298d1a46fdb622aa003c09815794bafb1e733f21846ba77f4f2d864f703842e827f41c673922c8e112f3da19

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

      Filesize

      53KB

      MD5

      01404e51f6442f60e478c306b1e6e52e

      SHA1

      37f234ccf5611b8309023410ceb9e76ad81f5678

      SHA256

      d4356dd23aa2e811712132f9718786331661a1bd0d062c49cb76807b9563928b

      SHA512

      94a9d843ae4055e2a9b412f03cba85e2d7b804ec3106f059d14ca50b15ae4acc6cd452f9461c2e21d1632d06848c969732c539aea17869b8b3a2f5ab93b891d7

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ypgfrxkz.z2c.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Roaming\underarmsmusklens\Edriophthalmian\Overtrdelser.Dok

      Filesize

      319KB

      MD5

      0333fb2b0e19a85944c9ea2538f15529

      SHA1

      cb7cf6aef6b3409205b0efa337eb5fc4f84fa237

      SHA256

      3529ab40264cb6806cb5ed7e64d98d29b94362987720cd633e4785f41e0163e2

      SHA512

      5fa5102e95fb393e47fea92d7cee9b0f66bfaa94ec0cace06a83bd18413eb9d7968e6973a8843aeb7f9b877418a11e3686f61d326569392ae3e6cb65cc51ea5e

    • C:\Users\Admin\AppData\Roaming\underarmsmusklens\Edriophthalmian\Paraffinerer.Dej

      Filesize

      53KB

      MD5

      6f2c225ff02a35f64c6157286f9e90b1

      SHA1

      fdfb286088fd3cb3c3fa39f39e2e7ba48b3c6624

      SHA256

      0f4caa809a6b9ad70a305958af34e60b82f3080bbb7067f316ca85702ffba443

      SHA512

      c5fb4eafb4c29b774648bcec26736ad0808815d10618c95b723de9296240e6f9cbc35e90cc4439266f013810f16dde0f44a840fa928d8be2a8562cc5ac8d2eb5

    • memory/748-128-0x0000000001000000-0x000000000104A000-memory.dmp

      Filesize

      296KB

    • memory/748-132-0x0000000023410000-0x0000000023460000-memory.dmp

      Filesize

      320KB

    • memory/748-136-0x0000000023510000-0x000000002351A000-memory.dmp

      Filesize

      40KB

    • memory/748-135-0x0000000023760000-0x00000000237F2000-memory.dmp

      Filesize

      584KB

    • memory/748-127-0x0000000001000000-0x0000000002254000-memory.dmp

      Filesize

      18.3MB

    • memory/748-133-0x0000000023C90000-0x00000000241BC000-memory.dmp

      Filesize

      5.2MB

    • memory/748-129-0x0000000022950000-0x00000000229EC000-memory.dmp

      Filesize

      624KB

    • memory/748-131-0x0000000023590000-0x0000000023752000-memory.dmp

      Filesize

      1.8MB

    • memory/1376-66-0x0000000070320000-0x000000007036C000-memory.dmp

      Filesize

      304KB

    • memory/1376-28-0x0000000073E90000-0x0000000074640000-memory.dmp

      Filesize

      7.7MB

    • memory/1376-92-0x0000000073E90000-0x0000000074640000-memory.dmp

      Filesize

      7.7MB

    • memory/1376-27-0x0000000073E90000-0x0000000074640000-memory.dmp

      Filesize

      7.7MB

    • memory/1376-82-0x0000000073E90000-0x0000000074640000-memory.dmp

      Filesize

      7.7MB

    • memory/1376-81-0x0000000073E90000-0x0000000074640000-memory.dmp

      Filesize

      7.7MB

    • memory/1376-80-0x0000000073E90000-0x0000000074640000-memory.dmp

      Filesize

      7.7MB

    • memory/1376-29-0x0000000073E90000-0x0000000074640000-memory.dmp

      Filesize

      7.7MB

    • memory/1376-67-0x00000000704C0000-0x0000000070814000-memory.dmp

      Filesize

      3.3MB

    • memory/1728-41-0x0000000006380000-0x00000000063A2000-memory.dmp

      Filesize

      136KB

    • memory/1728-47-0x0000000070320000-0x000000007036C000-memory.dmp

      Filesize

      304KB

    • memory/1728-64-0x0000000007440000-0x0000000007464000-memory.dmp

      Filesize

      144KB

    • memory/1728-65-0x0000000073E9E000-0x0000000073E9F000-memory.dmp

      Filesize

      4KB

    • memory/1728-46-0x0000000007260000-0x0000000007292000-memory.dmp

      Filesize

      200KB

    • memory/1728-62-0x00000000073D0000-0x00000000073DA000-memory.dmp

      Filesize

      40KB

    • memory/1728-78-0x0000000073E90000-0x0000000074640000-memory.dmp

      Filesize

      7.7MB

    • memory/1728-60-0x00000000072D0000-0x0000000007373000-memory.dmp

      Filesize

      652KB

    • memory/1728-61-0x0000000073E90000-0x0000000074640000-memory.dmp

      Filesize

      7.7MB

    • memory/1728-58-0x00000000072A0000-0x00000000072BE000-memory.dmp

      Filesize

      120KB

    • memory/1728-59-0x0000000073E90000-0x0000000074640000-memory.dmp

      Filesize

      7.7MB

    • memory/1728-83-0x0000000008720000-0x000000000AEA5000-memory.dmp

      Filesize

      39.5MB

    • memory/1728-85-0x0000000073E90000-0x0000000074640000-memory.dmp

      Filesize

      7.7MB

    • memory/1728-86-0x0000000073E90000-0x0000000074640000-memory.dmp

      Filesize

      7.7MB

    • memory/1728-87-0x0000000073E90000-0x0000000074640000-memory.dmp

      Filesize

      7.7MB

    • memory/1728-48-0x00000000704C0000-0x0000000070814000-memory.dmp

      Filesize

      3.3MB

    • memory/1728-91-0x0000000073E90000-0x0000000074640000-memory.dmp

      Filesize

      7.7MB

    • memory/1728-63-0x0000000007410000-0x000000000743A000-memory.dmp

      Filesize

      168KB

    • memory/1728-45-0x0000000073E90000-0x0000000074640000-memory.dmp

      Filesize

      7.7MB

    • memory/1728-44-0x00000000080A0000-0x000000000871A000-memory.dmp

      Filesize

      6.5MB

    • memory/1728-42-0x0000000007470000-0x0000000007A14000-memory.dmp

      Filesize

      5.6MB

    • memory/1728-40-0x0000000006310000-0x000000000632A000-memory.dmp

      Filesize

      104KB

    • memory/1728-7-0x0000000073E9E000-0x0000000073E9F000-memory.dmp

      Filesize

      4KB

    • memory/1728-39-0x0000000006DE0000-0x0000000006E76000-memory.dmp

      Filesize

      600KB

    • memory/1728-26-0x0000000005EC0000-0x0000000005F0C000-memory.dmp

      Filesize

      304KB

    • memory/1728-25-0x0000000005E10000-0x0000000005E2E000-memory.dmp

      Filesize

      120KB

    • memory/1728-8-0x0000000002830000-0x0000000002866000-memory.dmp

      Filesize

      216KB

    • memory/1728-24-0x0000000005850000-0x0000000005BA4000-memory.dmp

      Filesize

      3.3MB

    • memory/1728-14-0x00000000057E0000-0x0000000005846000-memory.dmp

      Filesize

      408KB

    • memory/1728-13-0x0000000005770000-0x00000000057D6000-memory.dmp

      Filesize

      408KB

    • memory/1728-12-0x0000000004E50000-0x0000000004E72000-memory.dmp

      Filesize

      136KB

    • memory/1728-11-0x0000000073E90000-0x0000000074640000-memory.dmp

      Filesize

      7.7MB

    • memory/1728-10-0x0000000073E90000-0x0000000074640000-memory.dmp

      Filesize

      7.7MB

    • memory/1728-9-0x0000000005140000-0x0000000005768000-memory.dmp

      Filesize

      6.2MB

    • memory/4644-125-0x0000000000800000-0x0000000001A54000-memory.dmp

      Filesize

      18.3MB