Analysis
-
max time kernel
115s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2025, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
SHIP PARTICULARS.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
SHIP PARTICULARS.exe
Resource
win10v2004-20250211-en
General
-
Target
SHIP PARTICULARS.exe
-
Size
1.1MB
-
MD5
7e01f412c2520b42e189f327f0b9fb89
-
SHA1
895317fb7c2939ee5dd0a6dd9dcb745dcf908ffa
-
SHA256
640b9f47f147b0d38fbcacb6aa057f67a32f8aa3fa4dfc45a83ef439319317a6
-
SHA512
eb0d2b0702e84497ce411118e7ed69309cccd9f06d9b63fc0e40b8abef8084d32522d21adeaced6e02f62c6e884e8a5dcccf22773e0fcb92d928895484d475c5
-
SSDEEP
24576:Au6J33O0c+JY5UZ+XC0kGso6Fau8sSB6l+aJWY:qu0c++OCvkGs9FauPS2+3Y
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7779092393:AAG1iBZU_dRiHJk5QaPmqA4YnolU1rdteJE/sendMessage?chat_id=2135869667
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 34 4272 Process not Found -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\subbasaltic.vbs subbasaltic.exe -
Executes dropped EXE 1 IoCs
pid Process 396 subbasaltic.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 checkip.dyndns.org 23 reallyfreegeoip.org 24 reallyfreegeoip.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023d77-14.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 396 set thread context of 3952 396 subbasaltic.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language subbasaltic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SHIP PARTICULARS.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2884 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3952 RegSvcs.exe 3952 RegSvcs.exe 3952 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 396 subbasaltic.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3952 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4256 SHIP PARTICULARS.exe 4256 SHIP PARTICULARS.exe 396 subbasaltic.exe 396 subbasaltic.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 4256 SHIP PARTICULARS.exe 4256 SHIP PARTICULARS.exe 396 subbasaltic.exe 396 subbasaltic.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4256 wrote to memory of 396 4256 SHIP PARTICULARS.exe 87 PID 4256 wrote to memory of 396 4256 SHIP PARTICULARS.exe 87 PID 4256 wrote to memory of 396 4256 SHIP PARTICULARS.exe 87 PID 396 wrote to memory of 3952 396 subbasaltic.exe 88 PID 396 wrote to memory of 3952 396 subbasaltic.exe 88 PID 396 wrote to memory of 3952 396 subbasaltic.exe 88 PID 396 wrote to memory of 3952 396 subbasaltic.exe 88 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1318997816-2171176372-1451785247-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SHIP PARTICULARS.exe"C:\Users\Admin\AppData\Local\Temp\SHIP PARTICULARS.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\peristeromorphous\subbasaltic.exe"C:\Users\Admin\AppData\Local\Temp\SHIP PARTICULARS.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\SHIP PARTICULARS.exe"3⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3952
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QjQyRDA3NjgtMDczNC00Njg5LUFBNkUtQ0VCOUIzQUY4NTM0fSIgdXNlcmlkPSJ7NEY2NkY0ODUtNkU3Qi00QzQ2LThDOTYtQUI3REIwODMzRERFfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7MjVFMzgwRTAtOTNGQi00MzQ1LTg4NzAtNEZDOEFCOTEzNzU0fSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMzNzEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDE5Mjc1MzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTAyNDMxODA2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD52868726988adf0edfef323911bb3172f
SHA1e7cf3545e404d6e678c4fd5b1ce180c94790302b
SHA2564cf365d7e0e50964d8e85802fc879ecd9692e921555ab2f27db5a8f127beeb91
SHA512816b2425cfaae340c820fc3e6ea888db0ba725be8be78e5761636eaa7a6f09d68a46a56eaad73f9d6c62ed0f0b74e8928d84d2b5752ea0b2143855424b81a413
-
Filesize
1.1MB
MD57e01f412c2520b42e189f327f0b9fb89
SHA1895317fb7c2939ee5dd0a6dd9dcb745dcf908ffa
SHA256640b9f47f147b0d38fbcacb6aa057f67a32f8aa3fa4dfc45a83ef439319317a6
SHA512eb0d2b0702e84497ce411118e7ed69309cccd9f06d9b63fc0e40b8abef8084d32522d21adeaced6e02f62c6e884e8a5dcccf22773e0fcb92d928895484d475c5