Analysis
-
max time kernel
121s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-02-2025 04:30
Static task
static1
Behavioral task
behavioral1
Sample
justificante.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
justificante.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250211-en
General
-
Target
justificante.exe
-
Size
1.2MB
-
MD5
1a4ed0a8fcb78acc5ada116e41d321e8
-
SHA1
4c4dff7b48b147c161a7cc0c9376647d69af30f7
-
SHA256
903d7920fc4c1dcb1523012750db17bc87a36f80801c299b9230c309bb7e0150
-
SHA512
f91a0488fde6d4b47eb595b1a89d5f8f1661d0bedc315eb98e2f88259a7f84f69f2737a5764665069f4a838cb5701d883a7854032767ed938e5c2399c924a372
-
SSDEEP
24576:AP885sNkJaSjGMdsRyBoaWrzAk2LIP4ylsjM3NVzyYTjMS:v9kYoGfmof4k2o4RjMXDTjMS
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7985048972:AAETw71DlbcHqzvtl1F1nkzl_0aMbnCis_c/sendMessage?chat_id=7794818739
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Loads dropped DLL 2 IoCs
pid Process 1664 justificante.exe 1664 justificante.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 5 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1072 justificante.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1664 justificante.exe 1072 justificante.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\resources\Woodbined189\gorgously.lnk justificante.exe File opened for modification C:\Windows\Fonts\Femlings.ini justificante.exe File opened for modification C:\Windows\resources\Disrespective\mouseweb.sup justificante.exe File opened for modification C:\Windows\resources\dmmer.Cer176 justificante.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language justificante.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language justificante.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1072 justificante.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1664 justificante.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1072 justificante.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1072 1664 justificante.exe 31 PID 1664 wrote to memory of 1072 1664 justificante.exe 31 PID 1664 wrote to memory of 1072 1664 justificante.exe 31 PID 1664 wrote to memory of 1072 1664 justificante.exe 31 PID 1664 wrote to memory of 1072 1664 justificante.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\justificante.exe"C:\Users\Admin\AppData\Local\Temp\justificante.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\justificante.exe"C:\Users\Admin\AppData\Local\Temp\justificante.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6B
MD550484c19f1afdaf3841a0d821ed393d2
SHA1c65a0fb7e74ffd2c9fc3a0f9aacb0f6a24b0a68b
SHA2566923dd1bc0460082c5d55a831908c24a282860b7f1cd6c2b79cf1bc8857c639c
SHA512d51a20d67571fe70bcd6c36e1382a3c342f42671c710090b75fcfc2405ce24488e03a7131eefe4751d0bd3aeaad816605ad10c8e3258d72fcf379e32416cbf3b
-
Filesize
7B
MD567cfa7364c4cf265b047d87ff2e673ae
SHA156e27889277981a9b63fcf5b218744a125bbc2fa
SHA256639b68bd180b47d542dd001d03557ee2d5b3065c3c783143bc9fb548f3fd7713
SHA51217f28a136b20b89e9c3a418b08fd8e6fcaac960872dc33b2481af2d872efc44228f420759c57724f5d953c7ba98f2283e2acc7dfe5a58cbf719c6480ec7a648b
-
Filesize
8B
MD5c3cb69218b85c3260387fb582cb518dd
SHA1961c892ded09a4cbb5392097bb845ccba65902ad
SHA2561c329924865741e0222d3ead23072cfbed14f96e2b0432573068eb0640513101
SHA5122402fffeb89c531db742bf6f5466eee8fe13edf97b8ecfc2cace3522806b322924d1ca81dda25e59b4047b8f40ad11ae9216e0a0d5c7fc6beef4368eb9551422
-
Filesize
10B
MD59a53fc1d7126c5e7c81bb5c15b15537b
SHA1e2d13e0fa37de4c98f30c728210d6afafbb2b000
SHA256a7de06c22e4e67908840ec3f00ab8fe9e04ae94fb16a74136002afbaf607ff92
SHA512b0bffbb8072dbdcfc68f0e632f727c08fe3ef936b2ef332c08486553ff2cef7b0bcdb400e421a117e977bb0fac17ce4706a8097e32d558a918433646b6d5f1a1
-
Filesize
12B
MD5558ec0e73952eb4a395e7f17eb69221e
SHA1d1cb97bfc8d9fad9eab7d19e685029b5f7084709
SHA2564d8a1cb0f83d824cec9e15e4d45605ed2cc92ae959602d0cc8873b0125d4cd74
SHA512698fb90fadb2b22ce78f874dac04c2f0bf72340d39f135e7736afdb9a9b28c9c55a8c6c9f871676134e6d057a90afc2944d1f1e8a117cc0f7a90c8d9b60c5dbe
-
Filesize
36B
MD574483b60253f907579f0ebaa81262424
SHA19bb553dee3ab92bf0b861fbaed514451dea0f902
SHA2564347e411413d2c4e39f1cab402f88379d4e9babb2a9072a773260c9072a2c0f6
SHA512e3c81e22d5b5c5f26c1a2dd20a883fe76cfd4919ee7def0c16f09ec08e02e5ff9ff1f74b5860305cf69b466037244dcec4702160d148e36b9bb0dbc1b13c1013
-
Filesize
11KB
MD5cf85183b87314359488b850f9e97a698
SHA16b6c790037eec7ebea4d05590359cb4473f19aea
SHA2563b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac
SHA512fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b