Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-02-2025 22:05
Static task
static1
Behavioral task
behavioral1
Sample
rJustificante67.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
rJustificante67.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
General
-
Target
rJustificante67.exe
-
Size
1001KB
-
MD5
96bc48e7cc38d731e7e2c25f3f80a88e
-
SHA1
bd30afd2f438928b3cb98d9f74766f1e401db091
-
SHA256
79714172680d9fd5b1d49fc518abe9cef9200194a04b6611466beccb28c31728
-
SHA512
7d71064359f17cae6128db87fdc9a743368b441310d5118734e0ba2a44f5673aeb0f93ea129faa51c6f61f36f135a38f2d90dc550708e87bec67131e4011f908
-
SSDEEP
24576:IGLEfEEQyQpBGB59WIMJfEKwqQnc9V4+QA3plULISW1D:1+3isWppTBEk3AAD
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7809339088:AAEUtMa_u0dd_zBfAWh2Ah2az4h6hNs_Wg0/sendMessage?chat_id=7618581100
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Loads dropped DLL 2 IoCs
pid Process 3056 rJustificante67.exe 3056 rJustificante67.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 5 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 checkip.dyndns.org 16 reallyfreegeoip.org 17 reallyfreegeoip.org -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\revyviserne\Tilbed.ini rJustificante67.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1044 rJustificante67.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3056 rJustificante67.exe 1044 rJustificante67.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\delarbejderne.nar rJustificante67.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\fremmder\ifaldne.lev rJustificante67.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rJustificante67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rJustificante67.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1044 rJustificante67.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3056 rJustificante67.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1044 rJustificante67.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3056 wrote to memory of 1044 3056 rJustificante67.exe 30 PID 3056 wrote to memory of 1044 3056 rJustificante67.exe 30 PID 3056 wrote to memory of 1044 3056 rJustificante67.exe 30 PID 3056 wrote to memory of 1044 3056 rJustificante67.exe 30 PID 3056 wrote to memory of 1044 3056 rJustificante67.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\rJustificante67.exe"C:\Users\Admin\AppData\Local\Temp\rJustificante67.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\rJustificante67.exe"C:\Users\Admin\AppData\Local\Temp\rJustificante67.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD575c1973354e477d3fbd5502b9583784e
SHA13d046a4787b1f770e2854e986c74e421675f9907
SHA25606735884a8ae8c9669e7df6ae24ed190fb0ba187d1cab366de391a2ca53dfa04
SHA5129ff2245f245a70e669b0f82f88a05c84d021f486a13d81b8ed26c49acfa73b72324274995247b343da3b7ffd377b748d22e91e6a4fe9da6116e377801bdb88f1
-
Filesize
11KB
MD5b853d5d2361ade731e33e882707efc34
SHA1c58b1aeabdf1cbb8334ef8797e7aceaa7a1cb6be
SHA256f0cd96e0b6e40f92ad1aa0efacde833bae807b92fca19bf062c1cf8acf29484b
SHA5128ea31d82ffa6f58dab5632fe72690d3a6db0be65aec85fc8a1f71626773c0974dcebefae17bcf67c4c56ef442545e985eea0b348ff6e4fc36740640092b08d69