Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
16/02/2025, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe
Resource
win10v2004-20250207-en
General
-
Target
3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe
-
Size
1.1MB
-
MD5
af0a7b9d983a13430107f6dcb04ee780
-
SHA1
a219173d553dd60eaff5f18ea7b3eb82cda4a3fd
-
SHA256
3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6c
-
SHA512
e05f9a7886e2858aae6cf2ad002d7713b3800808f23528f6a3a0aa603a2920856681a88e064c47d0466c6f861b644f49de142c6a460183d21d8a4df84a320f6f
-
SSDEEP
24576:jiVX2+2zDTxps71Dh7P2EJFBRi47ax9fRjbhZmATcWlEOsW4Bhw:F3TPs71N2EJFBRiCaLfRjrmA4W2OsW4B
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7354418955:AAH10FAR8IByRBtd_Qs69uwN7lnhl-2X18k/sendMessage?chat_id=6851554211
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4808 powershell.exe 3668 powershell.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 63 432 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\Control Panel\International\Geo\Nation 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe Key opened \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe Key opened \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 reallyfreegeoip.org 30 reallyfreegeoip.org 49 reallyfreegeoip.org 50 reallyfreegeoip.org 23 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 648 set thread context of 4676 648 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1488 MicrosoftEdgeUpdate.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4996 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 648 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe 3668 powershell.exe 4808 powershell.exe 4676 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe 3668 powershell.exe 4808 powershell.exe 4676 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 648 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe Token: SeDebugPrivilege 3668 powershell.exe Token: SeDebugPrivilege 4808 powershell.exe Token: SeDebugPrivilege 4676 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 648 wrote to memory of 4808 648 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe 90 PID 648 wrote to memory of 4808 648 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe 90 PID 648 wrote to memory of 3668 648 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe 91 PID 648 wrote to memory of 3668 648 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe 91 PID 648 wrote to memory of 4996 648 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe 92 PID 648 wrote to memory of 4996 648 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe 92 PID 648 wrote to memory of 4676 648 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe 96 PID 648 wrote to memory of 4676 648 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe 96 PID 648 wrote to memory of 4676 648 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe 96 PID 648 wrote to memory of 4676 648 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe 96 PID 648 wrote to memory of 4676 648 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe 96 PID 648 wrote to memory of 4676 648 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe"C:\Users\Admin\AppData\Local\Temp\3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\NtDgObhetS.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NtDgObhetS" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD0EC.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4996
-
-
C:\Users\Admin\AppData\Local\Temp\3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exeC:\Users\Admin\AppData\Local\Temp\3b047fc0647a4dd0cbf6c8535c364616720a916bd3fb14a4ff5543f18b662d6cN.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4676
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI4IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4ODkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTM2NTgwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTYyNDgxMzgyIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1488
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD52979eabc783eaca50de7be23dd4eafcf
SHA1d709ce5f3a06b7958a67e20870bfd95b83cad2ea
SHA256006cca90e78fbb571532a83082ac6712721a34ea4b21f490058ffb3f521f4903
SHA51292bc433990572d9427d0c93eef9bd1cc23fa00ed60dd0c9c983d87d3421e02ce3f156c6f88fe916ef6782dbf185cbce083bc0094f8c527f302be6a37d1c53aba
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5e2db578fcba251e8edb8affb9f331e78
SHA17bc9b78bc6a96eb068207cfe87d50a88fca676f5
SHA256109b28de9956beb411918a83becfd859ef47219f4852866e2fd4968f2c01c2e5
SHA51281c72000ec46cf8c376531d23bb6471373a648768957a03065e3fab19c24e540227bfada2259a3642d24aaea4e6a47c70ddc3114b6abcd3ba90fbfc41a23652f