Analysis
-
max time kernel
119s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2025 17:05
Static task
static1
Behavioral task
behavioral1
Sample
New Order 12960 Inquiry.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
New Order 12960 Inquiry.exe
Resource
win10v2004-20250129-en
General
-
Target
New Order 12960 Inquiry.exe
-
Size
767KB
-
MD5
5c009b0e4bb639e8dd7f5a1921f6d942
-
SHA1
5af4ef8bf1091d5e85016dbbd860fafd595d464c
-
SHA256
a8c8535f49c3869518e9d62f95086e5ac36526ea61d4203aa8d2077d33ae9faa
-
SHA512
064163938ad379c9bd77a38b6f64b127f67b909ae8ddc2cf0d1b88451b04b188bf4e9d47d42f42d4fe3a097dc5e2c31a6a9434a9fb7236fba6f4d7ba67ff5fc3
-
SSDEEP
12288:VC4sBuaYOTSwX7Ky7AcBC3/FGDetYd4ZMl7DNeNSSHkCO9X:Y4taZTSIpBdeg4ZMppvSE39X
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Global786@ - Email To:
[email protected]
https://api.telegram.org/bot8066712820:AAEAb01u8B6eDO5xCMdAz6XCOHC_L2RpVGo/sendMessage?chat_id=7667424178
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe Key opened \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe Key opened \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 checkip.dyndns.org 16 reallyfreegeoip.org 17 reallyfreegeoip.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3884 set thread context of 116 3884 New Order 12960 Inquiry.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order 12960 Inquiry.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3884 New Order 12960 Inquiry.exe 3884 New Order 12960 Inquiry.exe 3884 New Order 12960 Inquiry.exe 3884 New Order 12960 Inquiry.exe 3884 New Order 12960 Inquiry.exe 3884 New Order 12960 Inquiry.exe 116 vbc.exe 116 vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3884 New Order 12960 Inquiry.exe Token: SeDebugPrivilege 116 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3884 New Order 12960 Inquiry.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3884 New Order 12960 Inquiry.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3884 wrote to memory of 3212 3884 New Order 12960 Inquiry.exe 85 PID 3884 wrote to memory of 3212 3884 New Order 12960 Inquiry.exe 85 PID 3884 wrote to memory of 3212 3884 New Order 12960 Inquiry.exe 85 PID 3884 wrote to memory of 4464 3884 New Order 12960 Inquiry.exe 86 PID 3884 wrote to memory of 4464 3884 New Order 12960 Inquiry.exe 86 PID 3884 wrote to memory of 4464 3884 New Order 12960 Inquiry.exe 86 PID 3884 wrote to memory of 116 3884 New Order 12960 Inquiry.exe 87 PID 3884 wrote to memory of 116 3884 New Order 12960 Inquiry.exe 87 PID 3884 wrote to memory of 116 3884 New Order 12960 Inquiry.exe 87 PID 3884 wrote to memory of 116 3884 New Order 12960 Inquiry.exe 87 PID 3884 wrote to memory of 116 3884 New Order 12960 Inquiry.exe 87 PID 3884 wrote to memory of 116 3884 New Order 12960 Inquiry.exe 87 PID 3884 wrote to memory of 116 3884 New Order 12960 Inquiry.exe 87 PID 3884 wrote to memory of 116 3884 New Order 12960 Inquiry.exe 87 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order 12960 Inquiry.exe"C:\Users\Admin\AppData\Local\Temp\New Order 12960 Inquiry.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:3212
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:4464
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:116
-