Analysis
-
max time kernel
107s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 12:46
Static task
static1
Behavioral task
behavioral1
Sample
DHLDOCINV191224.gz.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DHLDOCINV191224.gz.exe
Resource
win10v2004-20241007-en
General
-
Target
DHLDOCINV191224.gz.exe
-
Size
1.1MB
-
MD5
49a44e1bd7ae31824843c4316f35eb35
-
SHA1
29ca56d04c4d089d7aa30df2d3480988da425fc0
-
SHA256
9ea5173104481c6538cb5fcdadc74682b3d422750039ab3311afe694e59b4602
-
SHA512
c7e88ce41dd529f69d5a9aeb0d6a87fff85872215eb92815a67eb4b6533ff19a0e985572185b1ebda374635684ac8a1a7cde7737e780676ebb09f4d9aa98c600
-
SSDEEP
24576:SqDEvCTbMWu7rQYlBQcBiT6rprG8aThZqa2nU5:STvC/MTQYxsWR7aTd2
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7289689475:AAGFe7RPg26YJkJcwIEyxRK_I9DsBw4teZU/sendMessage?chat_id=7360475312
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 reallyfreegeoip.org 18 reallyfreegeoip.org 11 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 816 set thread context of 4448 816 DHLDOCINV191224.gz.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHLDOCINV191224.gz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4448 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 816 DHLDOCINV191224.gz.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4448 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 816 DHLDOCINV191224.gz.exe 816 DHLDOCINV191224.gz.exe 816 DHLDOCINV191224.gz.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 816 DHLDOCINV191224.gz.exe 816 DHLDOCINV191224.gz.exe 816 DHLDOCINV191224.gz.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 816 wrote to memory of 4448 816 DHLDOCINV191224.gz.exe 82 PID 816 wrote to memory of 4448 816 DHLDOCINV191224.gz.exe 82 PID 816 wrote to memory of 4448 816 DHLDOCINV191224.gz.exe 82 PID 816 wrote to memory of 4448 816 DHLDOCINV191224.gz.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHLDOCINV191224.gz.exe"C:\Users\Admin\AppData\Local\Temp\DHLDOCINV191224.gz.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\DHLDOCINV191224.gz.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4448
-