Analysis
-
max time kernel
112s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-02-2025 14:59
Static task
static1
Behavioral task
behavioral1
Sample
Cubistic.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Cubistic.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250207-en
General
-
Target
Cubistic.exe
-
Size
744KB
-
MD5
615dbc6bbf1babd9d064ec9d24b211b1
-
SHA1
5465ddcd9aa36db67f3a29607f86c4df6989d026
-
SHA256
f1b6f735c651a28ecb97d4b9e21adc5d79ebed5b2686482f58ae33df3f13492d
-
SHA512
3a0d4769020d220676907a71d8fea5e2d61ca2e6d3ae79be14a7b4b5a99c78b03c044619e3c55c8a1e76f660cee26638932fd846ec580f8ad72b551d41cfdb04
-
SSDEEP
12288:lF9eqV6zZSsoOa/xy38SeD83S1vKZbXvOIxnE8UML789zUO9vVOI0emBmf:Zx6SsoOa/A3lRsUbbxnlGUOdb0emBmf
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7618867847:AAF14vnGvkJJYcxLyMVdR3OZPzd4TQzD_OY/sendMessage?chat_id=6070006284
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Loads dropped DLL 2 IoCs
pid Process 2172 Cubistic.exe 2172 Cubistic.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 3 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 checkip.dyndns.org 18 reallyfreegeoip.org 19 reallyfreegeoip.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1564 Cubistic.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2172 Cubistic.exe 1564 Cubistic.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Unelaborated.non Cubistic.exe File opened for modification C:\Program Files (x86)\Common Files\bedvelsens\Reaccelerates.ske Cubistic.exe File opened for modification C:\Program Files (x86)\Common Files\rhesusbarnet\teenfully.bra Cubistic.exe File opened for modification C:\Program Files (x86)\Common Files\infarkt.pla Cubistic.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\rothesay\Fallenternes.con Cubistic.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cubistic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cubistic.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1564 Cubistic.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2172 Cubistic.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1564 Cubistic.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1564 2172 Cubistic.exe 29 PID 2172 wrote to memory of 1564 2172 Cubistic.exe 29 PID 2172 wrote to memory of 1564 2172 Cubistic.exe 29 PID 2172 wrote to memory of 1564 2172 Cubistic.exe 29 PID 2172 wrote to memory of 1564 2172 Cubistic.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cubistic.exe"C:\Users\Admin\AppData\Local\Temp\Cubistic.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Cubistic.exe"C:\Users\Admin\AppData\Local\Temp\Cubistic.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
916B
MD53c0ea4d3e259fac27cf288a6951d355e
SHA167cf8514c27a54620b07f17dd71c5f1fe7607d28
SHA2568d25fc09c4a5f3df79a2885ced47fe7221646b8621854bcb85de7629cd135b4a
SHA512c418a78eef7433c9022d43903a1a21dbb9790bd4b0829980e63e93e58442c2316cfeef6f28dea5ee2b4748db9a4a15ab2838ae4ca07ebd7f3c4d7cb9f933d78b
-
Filesize
11KB
MD5cf85183b87314359488b850f9e97a698
SHA16b6c790037eec7ebea4d05590359cb4473f19aea
SHA2563b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac
SHA512fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b