Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe
Resource
win10v2004-20241007-en
General
-
Target
64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe
-
Size
626KB
-
MD5
406c82d85bd25857140116b91f8c3b3d
-
SHA1
5e62807cc5f68c061d1be770df181d1e23075dfd
-
SHA256
64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545
-
SHA512
c969d9ffb277f8e51fcc531f9cce8b974f26ce1525145312a248e9f34d4752ee924b181977468ae1d175b1067ddd68f6be45a5e1fda2f374a619ca4006bfc220
-
SSDEEP
12288:AORXHVTaXU/mlQF0FAIxlMZSkNyAJJjB55EQPzMm1:AORlTaXUVaqJhJjB37PzMS
Malware Config
Extracted
vipkeylogger
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 840 set thread context of 2536 840 64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2848 2536 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2536 CasPol.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 840 64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe Token: SeDebugPrivilege 2536 CasPol.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 840 wrote to memory of 2536 840 64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe 31 PID 840 wrote to memory of 2536 840 64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe 31 PID 840 wrote to memory of 2536 840 64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe 31 PID 840 wrote to memory of 2536 840 64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe 31 PID 840 wrote to memory of 2536 840 64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe 31 PID 840 wrote to memory of 2536 840 64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe 31 PID 840 wrote to memory of 2536 840 64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe 31 PID 840 wrote to memory of 2536 840 64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe 31 PID 840 wrote to memory of 2536 840 64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe 31 PID 840 wrote to memory of 2692 840 64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe 32 PID 840 wrote to memory of 2692 840 64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe 32 PID 840 wrote to memory of 2692 840 64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe 32 PID 2536 wrote to memory of 2848 2536 CasPol.exe 33 PID 2536 wrote to memory of 2848 2536 CasPol.exe 33 PID 2536 wrote to memory of 2848 2536 CasPol.exe 33 PID 2536 wrote to memory of 2848 2536 CasPol.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe"C:\Users\Admin\AppData\Local\Temp\64c5bc313008e6e595ab1eb59ec4b5fbdaa38e91d9f89def4fc1e66da64b2545.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 11523⤵
- Program crash
PID:2848
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 840 -s 6362⤵PID:2692
-