Analysis
-
max time kernel
119s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 12:46
Static task
static1
Behavioral task
behavioral1
Sample
DHLDOCINV191224.gz.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DHLDOCINV191224.gz.exe
Resource
win10v2004-20241007-en
General
-
Target
DHLDOCINV191224.gz.exe
-
Size
1.1MB
-
MD5
49a44e1bd7ae31824843c4316f35eb35
-
SHA1
29ca56d04c4d089d7aa30df2d3480988da425fc0
-
SHA256
9ea5173104481c6538cb5fcdadc74682b3d422750039ab3311afe694e59b4602
-
SHA512
c7e88ce41dd529f69d5a9aeb0d6a87fff85872215eb92815a67eb4b6533ff19a0e985572185b1ebda374635684ac8a1a7cde7737e780676ebb09f4d9aa98c600
-
SSDEEP
24576:SqDEvCTbMWu7rQYlBQcBiT6rprG8aThZqa2nU5:STvC/MTQYxsWR7aTd2
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7289689475:AAGFe7RPg26YJkJcwIEyxRK_I9DsBw4teZU/sendMessage?chat_id=7360475312
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org 8 reallyfreegeoip.org 9 reallyfreegeoip.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1700 set thread context of 2792 1700 DHLDOCINV191224.gz.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHLDOCINV191224.gz.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2792 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1700 DHLDOCINV191224.gz.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2792 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1700 DHLDOCINV191224.gz.exe 1700 DHLDOCINV191224.gz.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1700 DHLDOCINV191224.gz.exe 1700 DHLDOCINV191224.gz.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2792 1700 DHLDOCINV191224.gz.exe 30 PID 1700 wrote to memory of 2792 1700 DHLDOCINV191224.gz.exe 30 PID 1700 wrote to memory of 2792 1700 DHLDOCINV191224.gz.exe 30 PID 1700 wrote to memory of 2792 1700 DHLDOCINV191224.gz.exe 30 PID 1700 wrote to memory of 2792 1700 DHLDOCINV191224.gz.exe 30 PID 1700 wrote to memory of 2792 1700 DHLDOCINV191224.gz.exe 30 PID 1700 wrote to memory of 2792 1700 DHLDOCINV191224.gz.exe 30 PID 1700 wrote to memory of 2792 1700 DHLDOCINV191224.gz.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHLDOCINV191224.gz.exe"C:\Users\Admin\AppData\Local\Temp\DHLDOCINV191224.gz.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\DHLDOCINV191224.gz.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-