Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 10:32
Static task
static1
Behavioral task
behavioral1
Sample
transferenciainterbancaria_00081.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
transferenciainterbancaria_00081.exe
Resource
win10v2004-20241007-en
General
-
Target
transferenciainterbancaria_00081.exe
-
Size
541KB
-
MD5
54327a2f6c75bb2c549a5a98a462a588
-
SHA1
f65473fa075bef32b55445d84cb8bfa4da48ac79
-
SHA256
c3463021d3069ae7aad460707a950eb7b427a65c87f3d8e201b59cebb886a1b7
-
SHA512
88595fa0af8ac0211145787ce0d0d3afdfb396edfcfcbab16d4714fbfb1077a8eb8df5ec6bd9aaefd916611363dd7791c62cfaba24a571bd4279ffb93bb73866
-
SSDEEP
12288:aICfPgs7diA6gdZiygrNIVYAHHjMIyoS/B3FYA1YU:MZdL6AMxI+Aopz/lJv
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
Comercialplastico3. - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 24 2016 msiexec.exe 27 2016 msiexec.exe 34 2016 msiexec.exe 36 2016 msiexec.exe 40 2016 msiexec.exe 49 2016 msiexec.exe 51 2016 msiexec.exe 55 2016 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 23 drive.google.com 24 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 48 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2016 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1892 powershell.exe 2016 msiexec.exe -
pid Process 1892 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language transferenciainterbancaria_00081.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1892 powershell.exe 1892 powershell.exe 1892 powershell.exe 1892 powershell.exe 1892 powershell.exe 1892 powershell.exe 1892 powershell.exe 1892 powershell.exe 1892 powershell.exe 2016 msiexec.exe 2016 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1892 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1892 powershell.exe Token: SeIncreaseQuotaPrivilege 1892 powershell.exe Token: SeSecurityPrivilege 1892 powershell.exe Token: SeTakeOwnershipPrivilege 1892 powershell.exe Token: SeLoadDriverPrivilege 1892 powershell.exe Token: SeSystemProfilePrivilege 1892 powershell.exe Token: SeSystemtimePrivilege 1892 powershell.exe Token: SeProfSingleProcessPrivilege 1892 powershell.exe Token: SeIncBasePriorityPrivilege 1892 powershell.exe Token: SeCreatePagefilePrivilege 1892 powershell.exe Token: SeBackupPrivilege 1892 powershell.exe Token: SeRestorePrivilege 1892 powershell.exe Token: SeShutdownPrivilege 1892 powershell.exe Token: SeDebugPrivilege 1892 powershell.exe Token: SeSystemEnvironmentPrivilege 1892 powershell.exe Token: SeRemoteShutdownPrivilege 1892 powershell.exe Token: SeUndockPrivilege 1892 powershell.exe Token: SeManageVolumePrivilege 1892 powershell.exe Token: 33 1892 powershell.exe Token: 34 1892 powershell.exe Token: 35 1892 powershell.exe Token: 36 1892 powershell.exe Token: SeDebugPrivilege 2016 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3176 wrote to memory of 1892 3176 transferenciainterbancaria_00081.exe 85 PID 3176 wrote to memory of 1892 3176 transferenciainterbancaria_00081.exe 85 PID 3176 wrote to memory of 1892 3176 transferenciainterbancaria_00081.exe 85 PID 1892 wrote to memory of 2016 1892 powershell.exe 99 PID 1892 wrote to memory of 2016 1892 powershell.exe 99 PID 1892 wrote to memory of 2016 1892 powershell.exe 99 PID 1892 wrote to memory of 2016 1892 powershell.exe 99 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\transferenciainterbancaria_00081.exe"C:\Users\Admin\AppData\Local\Temp\transferenciainterbancaria_00081.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$overstemme=Get-Content -Raw 'C:\Users\Admin\AppData\Roaming\postarmistice\monospermy\brevbombe\Touchlvr.Pap';$Epicerebral=$overstemme.SubString(72415,3);.$Epicerebral($overstemme)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
340KB
MD5000c4c2148c711e5d3cbeed4144c6f55
SHA1e35927390a543bee257ae0009701c57ff6704e55
SHA2568e75a4461fdbc1386345f6f9ccd0984fbb1799b92033f902b2f43eb6421b9e7e
SHA512613bb7929d5bedf7a12c41553ad87b955c5ec6862e15db03e776dc55b396a7d25cda6e5f40319de8896d108d1521ad4cc1d070adea91f2e4dffe79ecbb5e654b
-
Filesize
70KB
MD55f7683b5fc367fb972fdaf8e80b65209
SHA1a13ff69f57af2e5ab471f513c8188437d6d2ee6c
SHA2564dd50c49d0122fc5e02ac8806e6f6abacfa8a5f9e868355824665dd76fad2959
SHA512d7b54e3e42c8ec494c6fdb69a4c7fb4d1c2a86229f5bde05ef17a97ba5134ad5a063080e9638ff2c44fb730a2c8ed42a34268f5c8c61c86e15e87d272c03c621