Analysis
-
max time kernel
118s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 12:47
Static task
static1
Behavioral task
behavioral1
Sample
DHL DOC INV 191224.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
DHL DOC INV 191224.exe
Resource
win10v2004-20241007-en
General
-
Target
DHL DOC INV 191224.exe
-
Size
1.1MB
-
MD5
49a44e1bd7ae31824843c4316f35eb35
-
SHA1
29ca56d04c4d089d7aa30df2d3480988da425fc0
-
SHA256
9ea5173104481c6538cb5fcdadc74682b3d422750039ab3311afe694e59b4602
-
SHA512
c7e88ce41dd529f69d5a9aeb0d6a87fff85872215eb92815a67eb4b6533ff19a0e985572185b1ebda374635684ac8a1a7cde7737e780676ebb09f4d9aa98c600
-
SSDEEP
24576:SqDEvCTbMWu7rQYlBQcBiT6rprG8aThZqa2nU5:STvC/MTQYxsWR7aTd2
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7289689475:AAGFe7RPg26YJkJcwIEyxRK_I9DsBw4teZU/sendMessage?chat_id=7360475312
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 reallyfreegeoip.org 9 reallyfreegeoip.org 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2128 set thread context of 2552 2128 DHL DOC INV 191224.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHL DOC INV 191224.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2552 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2128 DHL DOC INV 191224.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2552 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2128 DHL DOC INV 191224.exe 2128 DHL DOC INV 191224.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2128 DHL DOC INV 191224.exe 2128 DHL DOC INV 191224.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2552 2128 DHL DOC INV 191224.exe 30 PID 2128 wrote to memory of 2552 2128 DHL DOC INV 191224.exe 30 PID 2128 wrote to memory of 2552 2128 DHL DOC INV 191224.exe 30 PID 2128 wrote to memory of 2552 2128 DHL DOC INV 191224.exe 30 PID 2128 wrote to memory of 2552 2128 DHL DOC INV 191224.exe 30 PID 2128 wrote to memory of 2552 2128 DHL DOC INV 191224.exe 30 PID 2128 wrote to memory of 2552 2128 DHL DOC INV 191224.exe 30 PID 2128 wrote to memory of 2552 2128 DHL DOC INV 191224.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL DOC INV 191224.exe"C:\Users\Admin\AppData\Local\Temp\DHL DOC INV 191224.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\DHL DOC INV 191224.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-