Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
29/01/2025, 13:51
250129-q6ahxsxqem 1029/01/2025, 11:50
250129-nzvjeaxlez 1029/01/2025, 11:23
250129-nhj2cawphz 10Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250128-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
29/01/2025, 11:23
Static task
static1
Behavioral task
behavioral1
Sample
WICUQABDHPpcbAU.exe
Resource
win10ltsc2021-20250128-en
General
-
Target
WICUQABDHPpcbAU.exe
-
Size
1.1MB
-
MD5
e2bfaca136923b4e21f5ec3c94fa5add
-
SHA1
4e4705871e548966fc2c842e0e05b949fac3b77f
-
SHA256
286372582689c270359b64708765ec150af3fdf17f907bbacaa1680cbb8870d7
-
SHA512
4a95ba2ff98c6ca6e520671c24c2bd98b1fea0b5511f73d93184d4a452d32986665b343c1d6e237b6343cd0018859bab2317026a1b9038e52957a07a55b96f11
-
SSDEEP
24576:qXMbLqmVL/afbQvqKkzz+7FXVqL8YTUIe:5LqQjajQvqzGbYQIe
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.gtpv.online - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 864 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2839013668-2276131261-2828740280-1000\Control Panel\International\Geo\Nation WICUQABDHPpcbAU.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2839013668-2276131261-2828740280-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 WICUQABDHPpcbAU.exe Key opened \REGISTRY\USER\S-1-5-21-2839013668-2276131261-2828740280-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 WICUQABDHPpcbAU.exe Key opened \REGISTRY\USER\S-1-5-21-2839013668-2276131261-2828740280-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 WICUQABDHPpcbAU.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 checkip.dyndns.org 4 reallyfreegeoip.org 5 reallyfreegeoip.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4156 set thread context of 1080 4156 WICUQABDHPpcbAU.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WICUQABDHPpcbAU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WICUQABDHPpcbAU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1080 WICUQABDHPpcbAU.exe 864 powershell.exe 864 powershell.exe 1080 WICUQABDHPpcbAU.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1080 WICUQABDHPpcbAU.exe Token: SeDebugPrivilege 864 powershell.exe Token: SeIncreaseQuotaPrivilege 864 powershell.exe Token: SeSecurityPrivilege 864 powershell.exe Token: SeTakeOwnershipPrivilege 864 powershell.exe Token: SeLoadDriverPrivilege 864 powershell.exe Token: SeSystemProfilePrivilege 864 powershell.exe Token: SeSystemtimePrivilege 864 powershell.exe Token: SeProfSingleProcessPrivilege 864 powershell.exe Token: SeIncBasePriorityPrivilege 864 powershell.exe Token: SeCreatePagefilePrivilege 864 powershell.exe Token: SeBackupPrivilege 864 powershell.exe Token: SeRestorePrivilege 864 powershell.exe Token: SeShutdownPrivilege 864 powershell.exe Token: SeDebugPrivilege 864 powershell.exe Token: SeSystemEnvironmentPrivilege 864 powershell.exe Token: SeRemoteShutdownPrivilege 864 powershell.exe Token: SeUndockPrivilege 864 powershell.exe Token: SeManageVolumePrivilege 864 powershell.exe Token: 33 864 powershell.exe Token: 34 864 powershell.exe Token: 35 864 powershell.exe Token: 36 864 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4156 wrote to memory of 864 4156 WICUQABDHPpcbAU.exe 80 PID 4156 wrote to memory of 864 4156 WICUQABDHPpcbAU.exe 80 PID 4156 wrote to memory of 864 4156 WICUQABDHPpcbAU.exe 80 PID 4156 wrote to memory of 1080 4156 WICUQABDHPpcbAU.exe 82 PID 4156 wrote to memory of 1080 4156 WICUQABDHPpcbAU.exe 82 PID 4156 wrote to memory of 1080 4156 WICUQABDHPpcbAU.exe 82 PID 4156 wrote to memory of 1080 4156 WICUQABDHPpcbAU.exe 82 PID 4156 wrote to memory of 1080 4156 WICUQABDHPpcbAU.exe 82 PID 4156 wrote to memory of 1080 4156 WICUQABDHPpcbAU.exe 82 PID 4156 wrote to memory of 1080 4156 WICUQABDHPpcbAU.exe 82 PID 4156 wrote to memory of 1080 4156 WICUQABDHPpcbAU.exe 82 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2839013668-2276131261-2828740280-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 WICUQABDHPpcbAU.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2839013668-2276131261-2828740280-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 WICUQABDHPpcbAU.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WICUQABDHPpcbAU.exe"C:\Users\Admin\AppData\Local\Temp\WICUQABDHPpcbAU.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\WICUQABDHPpcbAU.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\WICUQABDHPpcbAU.exe"C:\Users\Admin\AppData\Local\Temp\WICUQABDHPpcbAU.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1080
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD552d666938f0111f0bfd0456a12623437
SHA10e88a434c23cad5bc0ef4c11e8e263c824e0530d
SHA2567c207d29e8efc73141c4bdd33c763c4cd0286bd8c63e814e7fdec8c4129b7e51
SHA512e05aa6a4237d2d69f07df60bce2e16b1b1c030d76a966c3b3df6c6c5754aad7c5ad2fcd71e0be5f2320805fc517429555943f2d004ad8ea3aa417e587aad7bc6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82