Resubmissions

16-01-2025 15:48

250116-s83zcsykbj 10

18-09-2024 13:24

240918-qnc64atfqr 10

Analysis

  • max time kernel
    76s
  • max time network
    78s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2025 15:48

General

  • Target

    rNEWPURCHASEORDER094637.exe

  • Size

    1.2MB

  • MD5

    0154fe9c5f4ad81beeedcf4fdb397ed4

  • SHA1

    939c3757ae0f62cda2ef34935d34f3ac70bba776

  • SHA256

    f8c3f6b1795091d7211dc5b0d508c9ffa115e6fbbab18b4ee9545b2124e211e5

  • SHA512

    957e65880d3979dd952f6989d460071ab6dbfcb6aaa036a6249153db7ff35c72ef51056e63bd9721697f5f8b528f1876d2a7f67b0b36646778a16d0d6246c5e5

  • SSDEEP

    24576:uRmJkcoQricOIQxiZY1iaCrUHNXxWZW6+xBAio0WjijTbwPGS:7JZoQrbTFZY1iaCrSxXzPWjijT0OS

Malware Config

Extracted

Family

vipkeylogger

Signatures

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Vipkeylogger family
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 11 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rNEWPURCHASEORDER094637.exe
    "C:\Users\Admin\AppData\Local\Temp\rNEWPURCHASEORDER094637.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Users\Admin\AppData\Local\Temp\rNEWPURCHASEORDER094637.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:3328
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1988 -parentBuildID 20240401114208 -prefsHandle 1904 -prefMapHandle 1896 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1e5628b8-842c-45fd-80cc-9da389028aa9} 2196 "\\.\pipe\gecko-crash-server-pipe.2196" gpu
        3⤵
          PID:4608
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2376 -parentBuildID 20240401114208 -prefsHandle 2368 -prefMapHandle 2364 -prefsLen 23716 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c3b1d794-63f0-468b-a47e-deef482f5fcf} 2196 "\\.\pipe\gecko-crash-server-pipe.2196" socket
          3⤵
          • Checks processor information in registry
          PID:3992
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3044 -childID 1 -isForBrowser -prefsHandle 3116 -prefMapHandle 3172 -prefsLen 23857 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {923c1186-1f48-4a72-b495-98aa6137b798} 2196 "\\.\pipe\gecko-crash-server-pipe.2196" tab
          3⤵
            PID:640
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4076 -childID 2 -isForBrowser -prefsHandle 4008 -prefMapHandle 1056 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1d740fc2-a0a4-40bf-a2cd-1cfb7586480f} 2196 "\\.\pipe\gecko-crash-server-pipe.2196" tab
            3⤵
              PID:3392
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4820 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4828 -prefMapHandle 4776 -prefsLen 29225 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07f1af0f-1e4f-4b64-9b4d-b8754ae021a4} 2196 "\\.\pipe\gecko-crash-server-pipe.2196" utility
              3⤵
              • Checks processor information in registry
              PID:2136
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5220 -childID 3 -isForBrowser -prefsHandle 5248 -prefMapHandle 5244 -prefsLen 27079 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e5739ee6-1fff-4c18-b0bf-78f20fbe04f9} 2196 "\\.\pipe\gecko-crash-server-pipe.2196" tab
              3⤵
                PID:2024
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5412 -childID 4 -isForBrowser -prefsHandle 5424 -prefMapHandle 5368 -prefsLen 27079 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6f7ab79d-c073-426c-8fb1-cac63cadcaff} 2196 "\\.\pipe\gecko-crash-server-pipe.2196" tab
                3⤵
                  PID:4384
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5572 -childID 5 -isForBrowser -prefsHandle 5580 -prefMapHandle 5584 -prefsLen 27079 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {42827dba-6674-46d5-b8ec-0535d48e9042} 2196 "\\.\pipe\gecko-crash-server-pipe.2196" tab
                  3⤵
                    PID:3656
              • C:\Windows\system32\NOTEPAD.EXE
                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\passwords.txt
                1⤵
                • Opens file in notepad (likely ransom note)
                PID:5056

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                Filesize

                5KB

                MD5

                565e77a23eca39a4ef7556899e923494

                SHA1

                9a874b3951cff5e7f66485ec1174d91206d04182

                SHA256

                18408d173c7a84c767fcccd37bb8e9503249153cb250ba7726ff23d27cedb2ac

                SHA512

                7e7690358e02df620f1558292b5cd911e0f427f16da024830b4a9277849608389691d8099a528de08af86f3177b55df454ad387c212f5ccac2ae8430b154710c

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\4305176c-1a4d-422f-9e94-73a0fdc31b85

                Filesize

                671B

                MD5

                e18b1295095a083eb33270ec868e0113

                SHA1

                3ccd17ff874de242cf2abad537ab0bec8f60fd58

                SHA256

                a99ae7552967001714779c9331f417c3f46903f2de9c6551656259c124bbc57c

                SHA512

                f8b0d18d90537ca750bdddbe7a43d32073f31396fbb9e8f65c51ece18958228f5ff021853cfb50b9bd9acd3b89fddc7cf3cf97c5b840345abe71419fdd75929b

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\885f9a53-df2a-4edd-8730-cad300ae2a01

                Filesize

                26KB

                MD5

                99c88656ccd67cf320ecf203c6ea6e5f

                SHA1

                e9a704627410d7fd05b00411b72c43083eead461

                SHA256

                9d2c38812c0c84902b6309ab9a572c6c874026faf38693cfc2516391605632b2

                SHA512

                c90474cf58436ebfc94ec1f2df8720123dff6edf4391f06b14a60f106718ea3e2b47645cc7cdb712610b975db78788158a1cd8a6d8369b14fc11657fc045b8f8

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\ba584eaf-f2cf-470b-8163-30465434e6e3

                Filesize

                982B

                MD5

                a1e6ceb5c0c27b14316f15a5d923e531

                SHA1

                ddf12a4051e72a685ac8e609dd97a145c723773c

                SHA256

                cd91dcd2e0443fdc3e071d0213c9918c163956bd179f1fb04b970b86236d51f1

                SHA512

                54e6c9e9f2411edfa2b4f5a477ce1f11b409e2de4dc5dd73f9c4512b66eb09d28fe658270e9cd38ed464dddf0e2e8fded9999c7e3634ed9c57128662a6ca8287

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs-1.js

                Filesize

                10KB

                MD5

                f12db98b8c0934a35784f3e928f53146

                SHA1

                f6a14f8e67b263ebea0fc1fe03260a4b96f0643e

                SHA256

                24480837c5e73fce92586418e006a542bd590cb6123e63c1925bdbcdd991edc1

                SHA512

                f3d7b81140abe77d633348d9affbfd66f2d241aa4dfc9b2b97e1c03fb33e622ea3009973b28a34caf673a3e1bfb3d0d56b5fa6606396f5c3552eccefc0a3846a

              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs.js

                Filesize

                10KB

                MD5

                5e255445260d992f48ff7dca04af60fc

                SHA1

                fe61387079a94dc197fdc656010fe03a00073ae5

                SHA256

                47b6abc52233e2cbea7afc8e4c89569af3af801fb5ea8c019711c3da558f3194

                SHA512

                6acbdb9b40fdc1e8ee4d388a9e5172d8b7802f2dfa7b85114ac9b3e508784d17d65a7eed69c1ea562ec5d4b555e3bef55e6f7b10353f541f6ab1beccd8965800

              • C:\Users\Admin\Desktop\passwords.txt

                Filesize

                37B

                MD5

                43a4dc5742cbbdf5e3e66df6d853da39

                SHA1

                a29024b5a6f7e1cc8fc8879157178839e3f45947

                SHA256

                f35932e0cd6672d6e2a52e345ca421504e6dc59261299c0dfc5560081422278a

                SHA512

                8855e03d8bf06d2207cfb68c96b3dd73922b3ecba19d8d2ce5406d30555c98de59c7413fc643b421ed1c14833472752abe3dd3e440805dc1288102752ccddeca

              • memory/3328-67-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-25-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-12-0x00000000739F0000-0x00000000741A0000-memory.dmp

                Filesize

                7.7MB

              • memory/3328-11-0x0000000005270000-0x00000000052CC000-memory.dmp

                Filesize

                368KB

              • memory/3328-13-0x00000000739F0000-0x00000000741A0000-memory.dmp

                Filesize

                7.7MB

              • memory/3328-37-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-73-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-71-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-3-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/3328-65-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-63-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-61-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-57-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-55-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-53-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-51-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-49-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-47-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-45-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-43-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-41-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-39-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-35-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-33-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-31-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-29-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-27-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-9-0x00000000739F0000-0x00000000741A0000-memory.dmp

                Filesize

                7.7MB

              • memory/3328-23-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-21-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-19-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-69-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-17-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-15-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-14-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-59-0x0000000005270000-0x00000000052C7000-memory.dmp

                Filesize

                348KB

              • memory/3328-1104-0x0000000005380000-0x000000000541C000-memory.dmp

                Filesize

                624KB

              • memory/3328-1105-0x00000000739F0000-0x00000000741A0000-memory.dmp

                Filesize

                7.7MB

              • memory/3328-10-0x0000000005A10000-0x0000000005FB4000-memory.dmp

                Filesize

                5.6MB

              • memory/3328-8-0x0000000002D50000-0x0000000002DAE000-memory.dmp

                Filesize

                376KB

              • memory/3328-7-0x00000000739FE000-0x00000000739FF000-memory.dmp

                Filesize

                4KB

              • memory/3328-6-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/3328-4-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/3328-5-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/3328-1375-0x0000000000400000-0x0000000000441000-memory.dmp

                Filesize

                260KB

              • memory/3328-1376-0x0000000006710000-0x00000000068D2000-memory.dmp

                Filesize

                1.8MB

              • memory/3328-1377-0x0000000006590000-0x00000000065E0000-memory.dmp

                Filesize

                320KB

              • memory/3328-1378-0x0000000006E10000-0x000000000733C000-memory.dmp

                Filesize

                5.2MB

              • memory/3328-1379-0x00000000739FE000-0x00000000739FF000-memory.dmp

                Filesize

                4KB

              • memory/3328-1380-0x00000000739F0000-0x00000000741A0000-memory.dmp

                Filesize

                7.7MB

              • memory/3328-1381-0x00000000739F0000-0x00000000741A0000-memory.dmp

                Filesize

                7.7MB

              • memory/3328-1446-0x0000000006980000-0x0000000006A12000-memory.dmp

                Filesize

                584KB

              • memory/3328-1447-0x00000000068E0000-0x00000000068EA000-memory.dmp

                Filesize

                40KB

              • memory/5092-2-0x0000000004420000-0x0000000004820000-memory.dmp

                Filesize

                4.0MB