Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2025, 14:13
Behavioral task
behavioral1
Sample
Original Shipping Docs.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Original Shipping Docs.exe
Resource
win10v2004-20241007-en
General
-
Target
Original Shipping Docs.exe
-
Size
520KB
-
MD5
fa95d941bc3b0a98262652b13b7a3290
-
SHA1
5d09e1eec6ffdc8bc8669d18f6f655b53cb9402e
-
SHA256
2bedd3f965d463529bb4096342c1741a19f28cbf7f2f222d2cb6513ddfe109bf
-
SHA512
20ec5b835e191104735897ace988978f0d36486fe7f98f6171fe4b537515250bd61897ae80029fe28c100bcc81d0e1cf78f52899de83f461f4e88d07329ca9de
-
SSDEEP
12288:NYV6MorX7qzuC3QHO9FQVHPF51jgc4ui42BiElpCOHg0/EWJ:iBXu9HGaVHXxVElpbgLWJ
Malware Config
Extracted
Protocol: smtp- Host:
mail.npmmachinery.com - Port:
587 - Username:
[email protected] - Password:
^@SC}ST5oCG-
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.npmmachinery.com - Port:
587 - Username:
[email protected] - Password:
^@SC}ST5oCG- - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Fonda.vbs Fonda.exe -
Executes dropped EXE 1 IoCs
pid Process 2748 Fonda.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 checkip.dyndns.org 11 reallyfreegeoip.org 12 reallyfreegeoip.org -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3908-18-0x00000000000F0000-0x0000000000221000-memory.dmp autoit_exe behavioral2/memory/2748-36-0x0000000000870000-0x00000000009A1000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2748 set thread context of 432 2748 Fonda.exe 83 -
resource yara_rule behavioral2/memory/3908-0-0x00000000000F0000-0x0000000000221000-memory.dmp upx behavioral2/files/0x000a000000023b77-15.dat upx behavioral2/memory/2748-16-0x0000000000870000-0x00000000009A1000-memory.dmp upx behavioral2/memory/3908-18-0x00000000000F0000-0x0000000000221000-memory.dmp upx behavioral2/memory/2748-36-0x0000000000870000-0x00000000009A1000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Original Shipping Docs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fonda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3908 Original Shipping Docs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 432 RegSvcs.exe 432 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2748 Fonda.exe 2748 Fonda.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 432 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3908 Original Shipping Docs.exe 3908 Original Shipping Docs.exe 2748 Fonda.exe 2748 Fonda.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3908 Original Shipping Docs.exe 3908 Original Shipping Docs.exe 2748 Fonda.exe 2748 Fonda.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3908 wrote to memory of 2748 3908 Original Shipping Docs.exe 82 PID 3908 wrote to memory of 2748 3908 Original Shipping Docs.exe 82 PID 3908 wrote to memory of 2748 3908 Original Shipping Docs.exe 82 PID 2748 wrote to memory of 432 2748 Fonda.exe 83 PID 2748 wrote to memory of 432 2748 Fonda.exe 83 PID 2748 wrote to memory of 432 2748 Fonda.exe 83 PID 2748 wrote to memory of 432 2748 Fonda.exe 83 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Original Shipping Docs.exe"C:\Users\Admin\AppData\Local\Temp\Original Shipping Docs.exe"1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\robustuous\Fonda.exe"C:\Users\Admin\AppData\Local\Temp\Original Shipping Docs.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\Original Shipping Docs.exe"3⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD5fa95d941bc3b0a98262652b13b7a3290
SHA15d09e1eec6ffdc8bc8669d18f6f655b53cb9402e
SHA2562bedd3f965d463529bb4096342c1741a19f28cbf7f2f222d2cb6513ddfe109bf
SHA51220ec5b835e191104735897ace988978f0d36486fe7f98f6171fe4b537515250bd61897ae80029fe28c100bcc81d0e1cf78f52899de83f461f4e88d07329ca9de