Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250211-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-02-2025 02:25

General

  • Target

    transferencia_345335.exe

  • Size

    742KB

  • MD5

    c0fb01b572eb0d863f470df8c93cbb5f

  • SHA1

    1f58b684aca32ffc6aa0d2684772bbd72c9aa69c

  • SHA256

    2eb79a7bf871a2a679c26d09845996dfeef3af3106d8708a7244bca3000df777

  • SHA512

    23a8c1283cd5bde134e08850a8663eb772d94ac31ccdd144ee26b4bde5a4a2d575e056dc96c187a2b2a1763bfe63af229c08fa52916b763033c2369b115df48f

  • SSDEEP

    12288:LF9pu9R98DvOx0dy38SeD83S1kAqjxnE8UML789zUO9vVOI0emBmZ:TpCUqxx3lRsJqjxnlGUOdb0emBmZ

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7860252135:AAFnqHLJ-Ng3O61cPpFaVL17gS5Ru2j08qg/sendMessage?chat_id=744079942

Signatures

  • Guloader family
  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Vipkeylogger family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 1 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\transferencia_345335.exe
    "C:\Users\Admin\AppData\Local\Temp\transferencia_345335.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\transferencia_345335.exe
      "C:\Users\Admin\AppData\Local\Temp\transferencia_345335.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:3224
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMyMzYiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDI1MTE0ODAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NTM1OTQ5NzEzIi8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:5036
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D2F7B5CA-A8AF-460E-BEA3-1E2856867080}\MicrosoftEdge_X64_133.0.3065.59.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D2F7B5CA-A8AF-460E-BEA3-1E2856867080}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:668
    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D2F7B5CA-A8AF-460E-BEA3-1E2856867080}\EDGEMITMP_EA73E.tmp\setup.exe
      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D2F7B5CA-A8AF-460E-BEA3-1E2856867080}\EDGEMITMP_EA73E.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D2F7B5CA-A8AF-460E-BEA3-1E2856867080}\MicrosoftEdge_X64_133.0.3065.59.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Installs/modifies Browser Helper Object
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4572
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D2F7B5CA-A8AF-460E-BEA3-1E2856867080}\EDGEMITMP_EA73E.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D2F7B5CA-A8AF-460E-BEA3-1E2856867080}\EDGEMITMP_EA73E.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D2F7B5CA-A8AF-460E-BEA3-1E2856867080}\EDGEMITMP_EA73E.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff652676a68,0x7ff652676a74,0x7ff652676a80
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        PID:2416
      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D2F7B5CA-A8AF-460E-BEA3-1E2856867080}\EDGEMITMP_EA73E.tmp\setup.exe
        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D2F7B5CA-A8AF-460E-BEA3-1E2856867080}\EDGEMITMP_EA73E.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:1844
        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D2F7B5CA-A8AF-460E-BEA3-1E2856867080}\EDGEMITMP_EA73E.tmp\setup.exe
          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D2F7B5CA-A8AF-460E-BEA3-1E2856867080}\EDGEMITMP_EA73E.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D2F7B5CA-A8AF-460E-BEA3-1E2856867080}\EDGEMITMP_EA73E.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff652676a68,0x7ff652676a74,0x7ff652676a80
          4⤵
          • Executes dropped EXE
          PID:5032
      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level
        3⤵
          PID:4516
          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff63d876a68,0x7ff63d876a74,0x7ff63d876a80
            4⤵
              PID:1324
          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level
            3⤵
              PID:1864
              • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff63d876a68,0x7ff63d876a74,0x7ff63d876a80
                4⤵
                  PID:2696
              • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level
                3⤵
                  PID:4640
                  • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.60 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.59 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ff63d876a68,0x7ff63d876a74,0x7ff63d876a80
                    4⤵
                      PID:4636

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D2F7B5CA-A8AF-460E-BEA3-1E2856867080}\EDGEMITMP_EA73E.tmp\setup.exe

                Filesize

                6.8MB

                MD5

                1b3e9c59f9c7a134ec630ada1eb76a39

                SHA1

                a7e831d392e99f3d37847dcc561dd2e017065439

                SHA256

                ce78ccfb0c9cdb06ea61116bc57e50690650b6b5cf37c1aebfb30c19458ee4ae

                SHA512

                c0e50410dc92d80ff7bc854907774fc551564e078a8d38ca6421f15cea50282c25efac4f357b52b066c4371f9b8d4900fa8122dd80ab06ecbd851c6e049f7a3e

              • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.59\Installer\setup.exe

                Filesize

                4.6MB

                MD5

                1e21adc564b8822f4862ca5c7636c840

                SHA1

                3e4fe2dd83ab7f33ebc642af953850294d09c0e5

                SHA256

                ba5b358ddfc976bb574777966b23569cb35170fde8f9bbb504dbccf6778d60c3

                SHA512

                16041cae529283fd5fb0dae6a64447cf7c466e306d8a750a781ac83bbc94b98b402bc22df2410745ed62af8ed2791216c462ec8b78817b07b6bbb9f9e3bb75a7

              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

                Filesize

                3.9MB

                MD5

                ad5f7dc7ca3e67dce70c0a89c04519e0

                SHA1

                a10b03234627ca8f3f8034cd5637cda1b8246d83

                SHA256

                663fe0f4e090583e6aa5204b9a80b7a76f677259066e56a7345aebc6bc3e7d31

                SHA512

                ad5490e9865caa454c47ec2e96364b9c566b553e64801da60c295acd570017747be1aff6f22ca6c20c6eee6f6d05a058af72569fd6e656f66e48010978c7fd51

              • C:\Program Files\msedge_installer.log

                Filesize

                74KB

                MD5

                e3491fbe0d4168a39a4aafcef9c67313

                SHA1

                c5bef8e42937d520d8ec19435a03677c9821c14d

                SHA256

                4114e9992647f8247c03f16e44a7c765b5ddf79c2fba4748e2a1ffc3a37473b5

                SHA512

                c11f6ea2fe3a7a214733f5f91525a0614e37dc447f67baf88e04ef62f39768bde706459183b9bb6f04810b030ad24f0454e8ae1d25c4a985ddd251add6c2be8d

              • C:\Program Files\msedge_installer.log

                Filesize

                99KB

                MD5

                6b1996e7b848d7d5e6d1aacd3915e119

                SHA1

                dbf5478779d5e63d2d7dd3c9d62036b81da27452

                SHA256

                c8254ccdb9db56dde8d3fc040d56f092faa5037203608b14ebacb2f2a8fd2f21

                SHA512

                47f23f567ced44e748ad076e6c2b5aa66d10331c6499747bbc57cf3311038f0b0505b669cd3c85369bef656bb54b02314450d42a6978a7e2acd59a5a35d2416f

              • C:\Program Files\msedge_installer.log

                Filesize

                102KB

                MD5

                5e7da7ec8f66b7e330ed82b59785f585

                SHA1

                4e5da4b1ae7b79c702434acfd37f5a8f90a32217

                SHA256

                4ae2c74d7435eb384126098d8b8b8e9d14afeaf64c19bafeac4884f51bf7f910

                SHA512

                51c7ef5fd23d955ae7eded112ca5c682e2439eb97b62fccabfc22ab1548699e011bbde442842b071ad50acab9f2fd586011ed22b831d5eeb986e0e867d56a753

              • C:\Program Files\msedge_installer.log

                Filesize

                106KB

                MD5

                44e4f150fb0f2d799451cc74dd78b90e

                SHA1

                0ec6ee38c325b810dc74151960640ea8b8af85a0

                SHA256

                c07b5f50a422779759606bfd0e85a02d2330c0ac9a25c62239a70e49973fb99e

                SHA512

                329d100b6cf253290feb0093ac11f75e981646df7a2ef8a28172da90ba9dc3673b3a4113a3775cde7d17e676d47a0889280532255bacc3d5d699fc0dca0beb4f

              • C:\Users\Admin\AppData\Local\Temp\nszF5E.tmp\System.dll

                Filesize

                11KB

                MD5

                cf85183b87314359488b850f9e97a698

                SHA1

                6b6c790037eec7ebea4d05590359cb4473f19aea

                SHA256

                3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac

                SHA512

                fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b

              • memory/1732-309-0x0000000077BD1000-0x0000000077CF1000-memory.dmp

                Filesize

                1.1MB

              • memory/1732-311-0x0000000010004000-0x0000000010005000-memory.dmp

                Filesize

                4KB

              • memory/1732-310-0x0000000077BD1000-0x0000000077CF1000-memory.dmp

                Filesize

                1.1MB

              • memory/3224-334-0x0000000038E00000-0x00000000393A4000-memory.dmp

                Filesize

                5.6MB

              • memory/3224-348-0x0000000039900000-0x0000000039E2C000-memory.dmp

                Filesize

                5.2MB

              • memory/3224-333-0x0000000000460000-0x00000000004A8000-memory.dmp

                Filesize

                288KB

              • memory/3224-335-0x0000000038C40000-0x0000000038CDC000-memory.dmp

                Filesize

                624KB

              • memory/3224-336-0x0000000072550000-0x0000000072D00000-memory.dmp

                Filesize

                7.7MB

              • memory/3224-339-0x000000007255E000-0x000000007255F000-memory.dmp

                Filesize

                4KB

              • memory/3224-340-0x0000000072550000-0x0000000072D00000-memory.dmp

                Filesize

                7.7MB

              • memory/3224-346-0x0000000039730000-0x00000000398F2000-memory.dmp

                Filesize

                1.8MB

              • memory/3224-347-0x00000000061D0000-0x0000000006220000-memory.dmp

                Filesize

                320KB

              • memory/3224-331-0x00000000016C0000-0x0000000005EAC000-memory.dmp

                Filesize

                71.9MB

              • memory/3224-351-0x00000000364F0000-0x0000000036582000-memory.dmp

                Filesize

                584KB

              • memory/3224-352-0x0000000007CD0000-0x0000000007CDA000-memory.dmp

                Filesize

                40KB

              • memory/3224-332-0x000000007255E000-0x000000007255F000-memory.dmp

                Filesize

                4KB

              • memory/3224-330-0x0000000000460000-0x00000000016B4000-memory.dmp

                Filesize

                18.3MB

              • memory/3224-316-0x0000000077C75000-0x0000000077C76000-memory.dmp

                Filesize

                4KB

              • memory/3224-315-0x0000000077BD1000-0x0000000077CF1000-memory.dmp

                Filesize

                1.1MB

              • memory/3224-314-0x0000000000460000-0x00000000016B4000-memory.dmp

                Filesize

                18.3MB

              • memory/3224-313-0x0000000077C58000-0x0000000077C59000-memory.dmp

                Filesize

                4KB

              • memory/3224-312-0x00000000016C0000-0x0000000005EAC000-memory.dmp

                Filesize

                71.9MB