Analysis
-
max time kernel
150s -
max time network
278s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 10:02
Static task
static1
Behavioral task
behavioral1
Sample
New Order list.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New Order list.exe
Resource
win10v2004-20241007-en
General
-
Target
New Order list.exe
-
Size
1.2MB
-
MD5
7d0c3e8ad0c9e73d5fb027a6ab1fd8e3
-
SHA1
2fcc79b1030844814dde5d595f5b1aee2ed2455d
-
SHA256
d67780a7f2fc2ded85c2ccdffdac398e9dac01759260536d61ef40744505ca91
-
SHA512
e3a77e3fc6f9bacfb028ca56e62534de79cc0cc69709d5a8e36bb4d918881d59a2e478a1a21039c1a6f6a924be668c500bd5955869237628246a4802432d9885
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCR3wuPqiUQ8EXQ7ERG0e0IDzAFWhsF:7JZoQrbTFZY1iaCfhRAZt0J7
Malware Config
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
cash@com12345
Extracted
vipkeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
cash@com12345 - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 checkip.dyndns.org 13 reallyfreegeoip.org 14 reallyfreegeoip.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1356 set thread context of 3860 1356 New Order list.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order list.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3860 RegSvcs.exe 3860 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1356 New Order list.exe 1356 New Order list.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3860 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1356 New Order list.exe 1356 New Order list.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1356 New Order list.exe 1356 New Order list.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1356 wrote to memory of 3860 1356 New Order list.exe 83 PID 1356 wrote to memory of 3860 1356 New Order list.exe 83 PID 1356 wrote to memory of 3860 1356 New Order list.exe 83 PID 1356 wrote to memory of 3860 1356 New Order list.exe 83 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order list.exe"C:\Users\Admin\AppData\Local\Temp\New Order list.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\New Order list.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3860
-