Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250211-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/02/2025, 10:00

General

  • Target

    factura_2404047141_2024-09-17T02_00.exe

  • Size

    686KB

  • MD5

    5a38c30a54b3b6f72907b334a5ce8e1a

  • SHA1

    568a123c1b4b5f8b09aef5603c19ceccb4b54850

  • SHA256

    4a4bde620f7d6baf02442d09999d40123bfa471e99fcb53d3617132b678bb6cb

  • SHA512

    719f1b1c287eceefbd56ab5527fa2ba623941f53ae83364ad247b6b9a6572fe12135584dffee46e9959d544f44904d437c1bf1ca252186409bef41cd9de55b80

  • SSDEEP

    12288:7PCMC15K0rytFYPwzrjfa7LvgdtZ+/qb48R15Skemda90xTM:7CM8V+tuPmzaIdt4Ck8Lgkem1xQ

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Vipkeylogger family
  • Downloads MZ/PE file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Blocklisted process makes network request 8 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\factura_2404047141_2024-09-17T02_00.exe
    "C:\Users\Admin\AppData\Local\Temp\factura_2404047141_2024-09-17T02_00.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle minimized "$Smergelpulveret=gc -Raw 'C:\Users\Admin\AppData\Local\Matens\Sexifid126\Sightfulness.Att';$Ationsprogrammet=$Smergelpulveret.SubString(52797,3);.$Ationsprogrammet($Smergelpulveret)"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3504
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\SysWOW64\msiexec.exe"
        3⤵
        • Accesses Microsoft Outlook profiles
        • Blocklisted process makes network request
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:4664
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMyMzYiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDI1MTE0ODAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDk2ODk0MjQzIi8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:4744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Matens\Sexifid126\Linjetllere.Aff

    Filesize

    337KB

    MD5

    c4e23e375e6d4f75a03bb4965d6cc3b3

    SHA1

    475a3fa124557dc3163917305308c06450ad7e59

    SHA256

    85a6aa4893d3267f7da12b7741a76cc82e98f91e7a34d518c74f41897a912638

    SHA512

    c42ac641ab0b16a2c717ef7d09034d72a57eb7299e9ebb85e42482528a103c4a377c0ab9ae8a2fcd5e8ad1d2fd1e2897afaf270cafd85531b481bb49d032ade3

  • C:\Users\Admin\AppData\Local\Matens\Sexifid126\Sightfulness.Att

    Filesize

    51KB

    MD5

    56df3fc2932793899317cfeb62d64449

    SHA1

    f9b092b5a1b1a127390596c69c45025c920958fc

    SHA256

    1ba02a55786e074d96e3fc4c252b9ec86d6c50b76121692680fde2b15881d4f2

    SHA512

    834b1bba8777a8b766e3214861ac9fc4850edb76ff9d225e01d79656dd373c206a2782ff4853ccb0c13e4271ac00733de2c46ed23e470007b3e480e8ed04cb3c

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bqe55s10.cbt.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\nsu1161.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    b5a1f9dc73e2944a388a61411bdd8c70

    SHA1

    dc9b20df3f3810c2e81a0c54dea385704ba8bef7

    SHA256

    288100583f65a2b7acfc0c7e231c0e268c58d3067675543f627c01e82f6fd884

    SHA512

    b9c8d71b5da00f2aff7847b9ec3bd8a588afeb525f47a0df235b52f7b2233edb3928a2c8e0b493f287c923cc52a340ad6fee99822595d6591df0e97870de92a8

  • memory/3504-21-0x0000000073A4E000-0x0000000073A4F000-memory.dmp

    Filesize

    4KB

  • memory/3504-22-0x0000000005170000-0x00000000051A6000-memory.dmp

    Filesize

    216KB

  • memory/3504-24-0x00000000057E0000-0x0000000005E08000-memory.dmp

    Filesize

    6.2MB

  • memory/3504-23-0x0000000073A40000-0x00000000741F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3504-25-0x0000000005660000-0x0000000005682000-memory.dmp

    Filesize

    136KB

  • memory/3504-26-0x0000000005E80000-0x0000000005EE6000-memory.dmp

    Filesize

    408KB

  • memory/3504-27-0x0000000005EF0000-0x0000000005F56000-memory.dmp

    Filesize

    408KB

  • memory/3504-37-0x0000000006120000-0x0000000006474000-memory.dmp

    Filesize

    3.3MB

  • memory/3504-39-0x0000000006780000-0x00000000067CC000-memory.dmp

    Filesize

    304KB

  • memory/3504-38-0x0000000006750000-0x000000000676E000-memory.dmp

    Filesize

    120KB

  • memory/3504-40-0x00000000079F0000-0x0000000007A86000-memory.dmp

    Filesize

    600KB

  • memory/3504-41-0x0000000006C30000-0x0000000006C4A000-memory.dmp

    Filesize

    104KB

  • memory/3504-42-0x0000000006CA0000-0x0000000006CC2000-memory.dmp

    Filesize

    136KB

  • memory/3504-43-0x0000000008040000-0x00000000085E4000-memory.dmp

    Filesize

    5.6MB

  • memory/3504-45-0x0000000008C70000-0x00000000092EA000-memory.dmp

    Filesize

    6.5MB

  • memory/3504-47-0x0000000073A40000-0x00000000741F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3504-59-0x0000000073A40000-0x00000000741F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3504-58-0x0000000007B90000-0x0000000007BAE000-memory.dmp

    Filesize

    120KB

  • memory/3504-48-0x000000006FF00000-0x000000006FF4C000-memory.dmp

    Filesize

    304KB

  • memory/3504-46-0x0000000007B50000-0x0000000007B82000-memory.dmp

    Filesize

    200KB

  • memory/3504-60-0x0000000007BC0000-0x0000000007C63000-memory.dmp

    Filesize

    652KB

  • memory/3504-61-0x0000000007CC0000-0x0000000007CCA000-memory.dmp

    Filesize

    40KB

  • memory/3504-62-0x0000000007E20000-0x0000000007E31000-memory.dmp

    Filesize

    68KB

  • memory/3504-63-0x0000000007E70000-0x0000000007E7E000-memory.dmp

    Filesize

    56KB

  • memory/3504-64-0x0000000007E80000-0x0000000007E94000-memory.dmp

    Filesize

    80KB

  • memory/3504-65-0x0000000007EC0000-0x0000000007EDA000-memory.dmp

    Filesize

    104KB

  • memory/3504-66-0x0000000007EB0000-0x0000000007EB8000-memory.dmp

    Filesize

    32KB

  • memory/3504-67-0x0000000007EC0000-0x0000000007EEA000-memory.dmp

    Filesize

    168KB

  • memory/3504-68-0x0000000007F10000-0x0000000007F34000-memory.dmp

    Filesize

    144KB

  • memory/3504-69-0x0000000073A40000-0x00000000741F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3504-72-0x0000000073A40000-0x00000000741F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3504-71-0x0000000073A4E000-0x0000000073A4F000-memory.dmp

    Filesize

    4KB

  • memory/3504-73-0x0000000073A40000-0x00000000741F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3504-75-0x0000000073A40000-0x00000000741F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3504-76-0x0000000073A40000-0x00000000741F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3504-77-0x00000000092F0000-0x000000000D2A8000-memory.dmp

    Filesize

    63.7MB

  • memory/3504-78-0x0000000073A40000-0x00000000741F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3504-79-0x0000000073A40000-0x00000000741F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3504-81-0x0000000073A40000-0x00000000741F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3504-82-0x0000000073A40000-0x00000000741F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3504-83-0x0000000073A40000-0x00000000741F0000-memory.dmp

    Filesize

    7.7MB

  • memory/4664-84-0x00000000004B0000-0x0000000001704000-memory.dmp

    Filesize

    18.3MB

  • memory/4664-98-0x00000000004B0000-0x00000000004F8000-memory.dmp

    Filesize

    288KB

  • memory/4664-97-0x00000000004B0000-0x0000000001704000-memory.dmp

    Filesize

    18.3MB

  • memory/4664-99-0x00000000236B0000-0x000000002374C000-memory.dmp

    Filesize

    624KB

  • memory/4664-103-0x0000000024170000-0x0000000024332000-memory.dmp

    Filesize

    1.8MB

  • memory/4664-104-0x00000000239B0000-0x0000000023A00000-memory.dmp

    Filesize

    320KB

  • memory/4664-105-0x0000000023AD0000-0x0000000023B62000-memory.dmp

    Filesize

    584KB

  • memory/4664-106-0x0000000023A80000-0x0000000023A8A000-memory.dmp

    Filesize

    40KB