Analysis

  • max time kernel
    107s
  • max time network
    203s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-12-2024 16:23

General

  • Target

    NOAH SNAKE CRYPT.exe

  • Size

    1.1MB

  • MD5

    b3d2a69e99c66568eef876049cdedb8d

  • SHA1

    1b7e1f804a40224c752ccf9e3ebfe6f179bada0b

  • SHA256

    9a3acf740959669ba7e2d778d78a3c8ad00236eaab8be03d6fa0ec21344b07af

  • SHA512

    0efa5a8bdb6331254dad87233356e407778b7e9fc90172e58293e60a8b01959f62240d2012c2a5e55904128f8d0ef3997b014659a9307a9a84d521422afe65f3

  • SSDEEP

    24576:8u6J33O0c+JY5UZ+XC0kGso6Fad2uRyrWtwWNqTDbqJ2ZWY:mu0c++OCvkGs9Fad2uRyrWtDWGFY

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.starofseasmarine.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Dontforget2015

Extracted

Family

vipkeylogger

Signatures

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Vipkeylogger family
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NOAH SNAKE CRYPT.exe
    "C:\Users\Admin\AppData\Local\Temp\NOAH SNAKE CRYPT.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4384
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Users\Admin\AppData\Local\Temp\NOAH SNAKE CRYPT.exe"
      2⤵
        PID:3744
      • C:\Users\Admin\AppData\Local\Temp\NOAH SNAKE CRYPT.exe
        "C:\Users\Admin\AppData\Local\Temp\NOAH SNAKE CRYPT.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Users\Admin\AppData\Local\Temp\NOAH SNAKE CRYPT.exe"
          3⤵
            PID:4992
          • C:\Users\Admin\AppData\Local\Temp\NOAH SNAKE CRYPT.exe
            "C:\Users\Admin\AppData\Local\Temp\NOAH SNAKE CRYPT.exe"
            3⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3640
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              "C:\Users\Admin\AppData\Local\Temp\NOAH SNAKE CRYPT.exe"
              4⤵
              • Accesses Microsoft Outlook profiles
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • outlook_office_path
              • outlook_win_path
              PID:2076

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\aut9DE6.tmp

        Filesize

        232KB

        MD5

        de38aceedf3c4a40e7734483872c87cd

        SHA1

        fd4b325d2d4e7afdcd8c9b147ad1503e41c11063

        SHA256

        04172d04b0a94a5ccdb1f0f60d609d4ee543044452b42a48407f9012abe65c5a

        SHA512

        ba9fc34ec86288b79d2e01d5ba7fa19c5385f5358ef22a3c0978c34431006cc8324f0cb3d8ba8d65bd3d902da89cf37efe18dfb972c974f8bf427d932767d34f

      • C:\Users\Admin\AppData\Local\Temp\gunfights

        Filesize

        243KB

        MD5

        69f81fdd85bc64c07d003900b43588f6

        SHA1

        bd203004c108bd0c2ed9f314f42eb6752c86b22c

        SHA256

        a99b6e4b9065337d70b7a844189f72777a3725c7a16a70ef1760203e401389e9

        SHA512

        277bc7aaac2aa0ad2fb5fea7269fc54c17a0d78981da35af6de5d852ec240769c9eb5b2abecb81c6fc41e9f282197fb6c314ab1876f13a0178044f337fd94bac

      • memory/2076-23-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2076-25-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2076-24-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2076-26-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2076-27-0x0000000002F10000-0x0000000002F6E000-memory.dmp

        Filesize

        376KB

      • memory/2076-28-0x0000000005C60000-0x0000000006206000-memory.dmp

        Filesize

        5.6MB

      • memory/2076-29-0x0000000005580000-0x00000000055DC000-memory.dmp

        Filesize

        368KB

      • memory/2076-37-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-83-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-89-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-85-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-81-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-79-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-77-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-75-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-73-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-71-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-67-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-65-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-63-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-61-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-59-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-57-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-55-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-53-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-51-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-49-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-47-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-45-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-43-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-41-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-39-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-87-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-35-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-69-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-33-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-31-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-30-0x0000000005580000-0x00000000055D7000-memory.dmp

        Filesize

        348KB

      • memory/2076-1120-0x0000000005750000-0x00000000057EC000-memory.dmp

        Filesize

        624KB

      • memory/2076-1121-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/2076-1122-0x0000000006A30000-0x0000000006BF2000-memory.dmp

        Filesize

        1.8MB

      • memory/2076-1123-0x00000000068C0000-0x0000000006910000-memory.dmp

        Filesize

        320KB

      • memory/2076-1124-0x0000000007130000-0x000000000765C000-memory.dmp

        Filesize

        5.2MB

      • memory/2076-1125-0x0000000006CA0000-0x0000000006D32000-memory.dmp

        Filesize

        584KB

      • memory/2076-1126-0x0000000006C00000-0x0000000006C0A000-memory.dmp

        Filesize

        40KB

      • memory/2260-14-0x0000000001520000-0x0000000001920000-memory.dmp

        Filesize

        4.0MB

      • memory/3640-22-0x00000000016D0000-0x0000000001AD0000-memory.dmp

        Filesize

        4.0MB

      • memory/4384-6-0x0000000001550000-0x0000000001950000-memory.dmp

        Filesize

        4.0MB