Analysis

  • max time kernel
    121s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2025, 07:26

General

  • Target

    SHIP PARTICULARS.exe

  • Size

    1.1MB

  • MD5

    7e01f412c2520b42e189f327f0b9fb89

  • SHA1

    895317fb7c2939ee5dd0a6dd9dcb745dcf908ffa

  • SHA256

    640b9f47f147b0d38fbcacb6aa057f67a32f8aa3fa4dfc45a83ef439319317a6

  • SHA512

    eb0d2b0702e84497ce411118e7ed69309cccd9f06d9b63fc0e40b8abef8084d32522d21adeaced6e02f62c6e884e8a5dcccf22773e0fcb92d928895484d475c5

  • SSDEEP

    24576:Au6J33O0c+JY5UZ+XC0kGso6Fau8sSB6l+aJWY:qu0c++OCvkGs9FauPS2+3Y

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7779092393:AAG1iBZU_dRiHJk5QaPmqA4YnolU1rdteJE/sendMessage?chat_id=2135869667

Signatures

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Vipkeylogger family
  • Drops startup file 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SHIP PARTICULARS.exe
    "C:\Users\Admin\AppData\Local\Temp\SHIP PARTICULARS.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Users\Admin\AppData\Local\peristeromorphous\subbasaltic.exe
      "C:\Users\Admin\AppData\Local\Temp\SHIP PARTICULARS.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Users\Admin\AppData\Local\Temp\SHIP PARTICULARS.exe"
        3⤵
          PID:2152
        • C:\Users\Admin\AppData\Local\peristeromorphous\subbasaltic.exe
          "C:\Users\Admin\AppData\Local\peristeromorphous\subbasaltic.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:1984
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Users\Admin\AppData\Local\peristeromorphous\subbasaltic.exe"
            4⤵
              PID:2820
            • C:\Users\Admin\AppData\Local\peristeromorphous\subbasaltic.exe
              "C:\Users\Admin\AppData\Local\peristeromorphous\subbasaltic.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2700
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                "C:\Users\Admin\AppData\Local\peristeromorphous\subbasaltic.exe"
                5⤵
                  PID:2720
                • C:\Users\Admin\AppData\Local\peristeromorphous\subbasaltic.exe
                  "C:\Users\Admin\AppData\Local\peristeromorphous\subbasaltic.exe"
                  5⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:2796
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    "C:\Users\Admin\AppData\Local\peristeromorphous\subbasaltic.exe"
                    6⤵
                      PID:2704
                    • C:\Users\Admin\AppData\Local\peristeromorphous\subbasaltic.exe
                      "C:\Users\Admin\AppData\Local\peristeromorphous\subbasaltic.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:2712
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                        "C:\Users\Admin\AppData\Local\peristeromorphous\subbasaltic.exe"
                        7⤵
                        • Accesses Microsoft Outlook profiles
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • outlook_office_path
                        • outlook_win_path
                        PID:2456

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\autD4CC.tmp

            Filesize

            233KB

            MD5

            3e85972504c9c155e7aec3ce459a0aa0

            SHA1

            3f5dbea1c47b8b1cdf16d2e58ddc4da5b77ef9ad

            SHA256

            8c2d77669468595cd5d58abf8297fccb741ff7da34b5106064a9f2e4f253774e

            SHA512

            19ed0ebf3ddd1f82bf4e3445ff0ac299f8c3a49b14044f6c4d439c350f4f307a99372d2c94b1e49f56e211aacc005e8ea5919e84c4cfadd0a06d790c75815cba

          • C:\Users\Admin\AppData\Local\Temp\autD4DD.tmp

            Filesize

            9KB

            MD5

            645af7d27733ce622edd3a17c0406ffd

            SHA1

            684bc6987b12109ba7360172e35e352d29eeda97

            SHA256

            724c4a3a6982b4ecf47c15fc0851288e4a611337c5b0096f241fb3050c3472ff

            SHA512

            09e1001b817e729bfd8270eacf3e6f7f45e52bcf712677ea7da38820d51d56d830ed10d0737346d40af02f00c94f04f13e9ad27eccadc1f10fe53cef7d94303a

          • C:\Users\Admin\AppData\Local\Temp\epistemology

            Filesize

            243KB

            MD5

            72635a9c34378068e8bfef21a6906844

            SHA1

            342c36d0f60acba2d876723452742b8e7bfff03c

            SHA256

            b769c190804f9ee2eef31abcb8e2b3e49a13ded23059b038d945e02dc07f9a25

            SHA512

            81447f7e384dba02ccfb66e9a0dcbacde4c9db81bd168dd25a666ecc7874ed9913d290b6d890961b427a2d201f759cd91cf52781689fcb5223b29d3a081c183c

          • C:\Users\Admin\AppData\Local\Temp\meshummad

            Filesize

            29KB

            MD5

            2868726988adf0edfef323911bb3172f

            SHA1

            e7cf3545e404d6e678c4fd5b1ce180c94790302b

            SHA256

            4cf365d7e0e50964d8e85802fc879ecd9692e921555ab2f27db5a8f127beeb91

            SHA512

            816b2425cfaae340c820fc3e6ea888db0ba725be8be78e5761636eaa7a6f09d68a46a56eaad73f9d6c62ed0f0b74e8928d84d2b5752ea0b2143855424b81a413

          • \Users\Admin\AppData\Local\peristeromorphous\subbasaltic.exe

            Filesize

            1.1MB

            MD5

            7e01f412c2520b42e189f327f0b9fb89

            SHA1

            895317fb7c2939ee5dd0a6dd9dcb745dcf908ffa

            SHA256

            640b9f47f147b0d38fbcacb6aa057f67a32f8aa3fa4dfc45a83ef439319317a6

            SHA512

            eb0d2b0702e84497ce411118e7ed69309cccd9f06d9b63fc0e40b8abef8084d32522d21adeaced6e02f62c6e884e8a5dcccf22773e0fcb92d928895484d475c5

          • memory/1484-11-0x0000000000120000-0x0000000000124000-memory.dmp

            Filesize

            16KB

          • memory/2456-136-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-130-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-91-0x0000000000200000-0x0000000000260000-memory.dmp

            Filesize

            384KB

          • memory/2456-92-0x0000000000A60000-0x0000000000ABC000-memory.dmp

            Filesize

            368KB

          • memory/2456-93-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-94-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-96-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-98-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-100-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-102-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-104-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-110-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-114-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-138-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-89-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2456-134-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-133-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-90-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2456-128-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-126-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-124-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-122-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-120-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-118-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-116-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-112-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-108-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-106-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-140-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-142-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-144-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-146-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-148-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-150-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-152-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB

          • memory/2456-154-0x0000000000A60000-0x0000000000AB8000-memory.dmp

            Filesize

            352KB