Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2025 06:48
Static task
static1
Behavioral task
behavioral1
Sample
Opsprtning.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Opsprtning.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250211-en
General
-
Target
Opsprtning.exe
-
Size
756KB
-
MD5
36778a82c524fca3b6946eea12169d90
-
SHA1
4001562de8499dc93076a19ba844395e6a5abc10
-
SHA256
8a7fdce71df474378c98736c8f93bacb45ab6034bd71316b5eeb40c692d3ee21
-
SHA512
3fc0111a976324bcc489dc2424e3541609e257643f7cc2c3a1f6e90e80ea6eda19a0630f79946c1de5a86946104183eb0a873ec0365cd5abf5aea1c1b751e8f8
-
SSDEEP
12288:NF921bthmFx2M9Fy38SeD83S1CvnWXAFxnE8UML789zUO9vVOI0emBmz:xShEx3G3lRsCfWYxnlGUOdb0emBmz
Malware Config
Extracted
vipkeylogger
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 69 3904 Process not Found -
Loads dropped DLL 2 IoCs
pid Process 1700 Opsprtning.exe 1700 Opsprtning.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 39 drive.google.com 41 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 78 checkip.dyndns.org 80 reallyfreegeoip.org 81 reallyfreegeoip.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1620 Opsprtning.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1700 Opsprtning.exe 1620 Opsprtning.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\bedvelsens\Reaccelerates.ske Opsprtning.exe File opened for modification C:\Program Files (x86)\Common Files\rhesusbarnet\teenfully.bra Opsprtning.exe File opened for modification C:\Program Files (x86)\Common Files\infarkt.pla Opsprtning.exe File opened for modification C:\Program Files (x86)\Unelaborated.non Opsprtning.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\rothesay\Fallenternes.con Opsprtning.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opsprtning.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opsprtning.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4004 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1620 Opsprtning.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1700 Opsprtning.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1620 Opsprtning.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1620 1700 Opsprtning.exe 92 PID 1700 wrote to memory of 1620 1700 Opsprtning.exe 92 PID 1700 wrote to memory of 1620 1700 Opsprtning.exe 92 PID 1700 wrote to memory of 1620 1700 Opsprtning.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Opsprtning.exe"C:\Users\Admin\AppData\Local\Temp\Opsprtning.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\Opsprtning.exe"C:\Users\Admin\AppData\Local\Temp\Opsprtning.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI2IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1Mzk2ODkwNDIwIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5cf85183b87314359488b850f9e97a698
SHA16b6c790037eec7ebea4d05590359cb4473f19aea
SHA2563b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac
SHA512fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b
-
Filesize
906B
MD57a28dbf88dab1a80751b5b1a37e28576
SHA11fe05f192c23eac50cbf7c4ef46ff4950a0cb51a
SHA25603d80e709f8d4b84a6e21dc77ba328ca283c33c5aaee482735a726392020b6da
SHA512f25752516614d6607fb247c29d5010bc79a5fd090ba63b1f9efd81238c8472d0c9b89c3bd5f792a62fd9178be120fa1bffd54517ca2d6e5b9a3c3ec64693ca3d