Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2025 17:03
Static task
static1
Behavioral task
behavioral1
Sample
New Order 12960 Inquiry.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New Order 12960 Inquiry.exe
Resource
win10v2004-20250129-en
General
-
Target
New Order 12960 Inquiry.exe
-
Size
767KB
-
MD5
5c009b0e4bb639e8dd7f5a1921f6d942
-
SHA1
5af4ef8bf1091d5e85016dbbd860fafd595d464c
-
SHA256
a8c8535f49c3869518e9d62f95086e5ac36526ea61d4203aa8d2077d33ae9faa
-
SHA512
064163938ad379c9bd77a38b6f64b127f67b909ae8ddc2cf0d1b88451b04b188bf4e9d47d42f42d4fe3a097dc5e2c31a6a9434a9fb7236fba6f4d7ba67ff5fc3
-
SSDEEP
12288:VC4sBuaYOTSwX7Ky7AcBC3/FGDetYd4ZMl7DNeNSSHkCO9X:Y4taZTSIpBdeg4ZMppvSE39X
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Global786@ - Email To:
[email protected]
https://api.telegram.org/bot8066712820:AAEAb01u8B6eDO5xCMdAz6XCOHC_L2RpVGo/sendMessage?chat_id=7667424178
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4174397412-4125106315-2776226590-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe Key opened \REGISTRY\USER\S-1-5-21-4174397412-4125106315-2776226590-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe Key opened \REGISTRY\USER\S-1-5-21-4174397412-4125106315-2776226590-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 checkip.dyndns.org 16 reallyfreegeoip.org 17 reallyfreegeoip.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 244 set thread context of 2564 244 New Order 12960 Inquiry.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order 12960 Inquiry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 244 New Order 12960 Inquiry.exe 244 New Order 12960 Inquiry.exe 2564 vbc.exe 2564 vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 244 New Order 12960 Inquiry.exe Token: SeDebugPrivilege 2564 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 244 New Order 12960 Inquiry.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 244 New Order 12960 Inquiry.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 244 wrote to memory of 2564 244 New Order 12960 Inquiry.exe 86 PID 244 wrote to memory of 2564 244 New Order 12960 Inquiry.exe 86 PID 244 wrote to memory of 2564 244 New Order 12960 Inquiry.exe 86 PID 244 wrote to memory of 2564 244 New Order 12960 Inquiry.exe 86 PID 244 wrote to memory of 2564 244 New Order 12960 Inquiry.exe 86 PID 244 wrote to memory of 2564 244 New Order 12960 Inquiry.exe 86 PID 244 wrote to memory of 2564 244 New Order 12960 Inquiry.exe 86 PID 244 wrote to memory of 2564 244 New Order 12960 Inquiry.exe 86 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4174397412-4125106315-2776226590-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4174397412-4125106315-2776226590-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order 12960 Inquiry.exe"C:\Users\Admin\AppData\Local\Temp\New Order 12960 Inquiry.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2564
-