Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
0ae1e00bec56390e433869331168026ba022944634003a790324d48ebb129673.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ae1e00bec56390e433869331168026ba022944634003a790324d48ebb129673.exe
Resource
win10v2004-20241007-en
General
-
Target
0ae1e00bec56390e433869331168026ba022944634003a790324d48ebb129673.exe
-
Size
557KB
-
MD5
10af7f586190bc8a4de0850d39975e68
-
SHA1
77c03f9e53c6fe5b7972741766bcae5c8be022c7
-
SHA256
0ae1e00bec56390e433869331168026ba022944634003a790324d48ebb129673
-
SHA512
3117d1e30c6623120815447dfd81f61f00e04e1703a693c21777aa1007908ea45815ccfe47a74df372454f2e9dd284bbf062faa09afb9da6a7e735212946cba3
-
SSDEEP
12288:1kuicmiSkWUG1iUOFYTqB91HhVs3mySMpQKA:NicmdktG0nYQ1HtGnA
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
JA-*2020antonio - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 23 4408 msiexec.exe 25 4408 msiexec.exe 27 4408 msiexec.exe 31 4408 msiexec.exe 35 4408 msiexec.exe 48 4408 msiexec.exe 52 4408 msiexec.exe 54 4408 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 22 drive.google.com 23 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 47 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4408 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1572 powershell.exe 4408 msiexec.exe -
pid Process 1572 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ae1e00bec56390e433869331168026ba022944634003a790324d48ebb129673.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1572 powershell.exe 1572 powershell.exe 1572 powershell.exe 1572 powershell.exe 1572 powershell.exe 1572 powershell.exe 1572 powershell.exe 1572 powershell.exe 1572 powershell.exe 4408 msiexec.exe 4408 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1572 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1572 powershell.exe Token: SeIncreaseQuotaPrivilege 1572 powershell.exe Token: SeSecurityPrivilege 1572 powershell.exe Token: SeTakeOwnershipPrivilege 1572 powershell.exe Token: SeLoadDriverPrivilege 1572 powershell.exe Token: SeSystemProfilePrivilege 1572 powershell.exe Token: SeSystemtimePrivilege 1572 powershell.exe Token: SeProfSingleProcessPrivilege 1572 powershell.exe Token: SeIncBasePriorityPrivilege 1572 powershell.exe Token: SeCreatePagefilePrivilege 1572 powershell.exe Token: SeBackupPrivilege 1572 powershell.exe Token: SeRestorePrivilege 1572 powershell.exe Token: SeShutdownPrivilege 1572 powershell.exe Token: SeDebugPrivilege 1572 powershell.exe Token: SeSystemEnvironmentPrivilege 1572 powershell.exe Token: SeRemoteShutdownPrivilege 1572 powershell.exe Token: SeUndockPrivilege 1572 powershell.exe Token: SeManageVolumePrivilege 1572 powershell.exe Token: 33 1572 powershell.exe Token: 34 1572 powershell.exe Token: 35 1572 powershell.exe Token: 36 1572 powershell.exe Token: SeDebugPrivilege 4408 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4808 wrote to memory of 1572 4808 0ae1e00bec56390e433869331168026ba022944634003a790324d48ebb129673.exe 83 PID 4808 wrote to memory of 1572 4808 0ae1e00bec56390e433869331168026ba022944634003a790324d48ebb129673.exe 83 PID 4808 wrote to memory of 1572 4808 0ae1e00bec56390e433869331168026ba022944634003a790324d48ebb129673.exe 83 PID 1572 wrote to memory of 4408 1572 powershell.exe 96 PID 1572 wrote to memory of 4408 1572 powershell.exe 96 PID 1572 wrote to memory of 4408 1572 powershell.exe 96 PID 1572 wrote to memory of 4408 1572 powershell.exe 96 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ae1e00bec56390e433869331168026ba022944634003a790324d48ebb129673.exe"C:\Users\Admin\AppData\Local\Temp\0ae1e00bec56390e433869331168026ba022944634003a790324d48ebb129673.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Depletions=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\Lysstraales\Genoversat\lirens\Coprides\Centuple.Ama';$Crooksterned=$Depletions.SubString(700,3);.$Crooksterned($Depletions)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4408
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5f107ba814c47b96c6a0e5ed4b0d110a4
SHA162cbb8e89dc9cdc9ffaf38c7284e95c067fce4f8
SHA256c1a58e217ef05e0ce41b20b1849b1131ebe350d87333ab57a52da61243a7dee7
SHA51249c45250eabd4ec2a8176dd0b658b021c85abce9b2af151df9b2a651153f40c9c79638a48a12725239faa2fe70b73d02d16f184427f35cb8908c9a3d9c3aa221
-
Filesize
299KB
MD558c2b03351c618b0dd56b1d0fb26ae54
SHA11bfcbd92f0680695214092a697038f4d05d71e95
SHA256c58c7722bb73dc0d4ad1095d5285b6b15808961a9a604a9a53490583ddb49abe
SHA512aabf3ef2c7227c3f6089b309bb893e78d4282b266b4b6993f114a831c56445d7e881b72cc6c4796b1ef9ba6b6f3d8ab2dc2ee2f82319aaac22be2cc5b8edd57a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82