Analysis
-
max time kernel
218s -
max time network
293s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
17/02/2025, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
SPECIFICATIONS112025.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SPECIFICATIONS112025.exe
Resource
win10v2004-20250207-en
General
-
Target
SPECIFICATIONS112025.exe
-
Size
1.1MB
-
MD5
1b941eb0d1776fc0a50f6a68162e0cb2
-
SHA1
59528929deb3d83d73b57fc68487b2edd41d7b95
-
SHA256
74a376edcff8224f1dcbb9f18ff4f10251e149f2073d9d0e0364ac5a0c599e88
-
SHA512
7a52449d6d9238ca0cce15ea51387aabe09e85b25b8e32fab6b3909b38f941fe87ae9b8239f5ab6d3c0beb18b75cf1b578dc3aaaae3553c60a2c8e1d3dd08e68
-
SSDEEP
24576:Hu6J33O0c+JY5UZ+XC0kGso6Fa40PVL45NTFw6KdNDaLTHWY:Bu0c++OCvkGs9Fa40tdNOLCY
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7691385902:AAE3XO9fSZaslUuLJsnstHhsbkGKUMXLieU/sendMessage?chat_id=7463064549
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 66 3928 Process not Found -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\spiketail.vbs spiketail.exe -
Executes dropped EXE 1 IoCs
pid Process 4924 spiketail.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 checkip.dyndns.org 28 reallyfreegeoip.org 29 reallyfreegeoip.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023d04-16.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4924 set thread context of 2668 4924 spiketail.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SPECIFICATIONS112025.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spiketail.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5216 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2668 RegSvcs.exe 2668 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4924 spiketail.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2668 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2140 SPECIFICATIONS112025.exe 2140 SPECIFICATIONS112025.exe 4924 spiketail.exe 4924 spiketail.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2140 SPECIFICATIONS112025.exe 2140 SPECIFICATIONS112025.exe 4924 spiketail.exe 4924 spiketail.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2140 wrote to memory of 4924 2140 SPECIFICATIONS112025.exe 92 PID 2140 wrote to memory of 4924 2140 SPECIFICATIONS112025.exe 92 PID 2140 wrote to memory of 4924 2140 SPECIFICATIONS112025.exe 92 PID 4924 wrote to memory of 2668 4924 spiketail.exe 93 PID 4924 wrote to memory of 2668 4924 spiketail.exe 93 PID 4924 wrote to memory of 2668 4924 spiketail.exe 93 PID 4924 wrote to memory of 2668 4924 spiketail.exe 93 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SPECIFICATIONS112025.exe"C:\Users\Admin\AppData\Local\Temp\SPECIFICATIONS112025.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\done\spiketail.exe"C:\Users\Admin\AppData\Local\Temp\SPECIFICATIONS112025.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\SPECIFICATIONS112025.exe"3⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2668
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI5IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDY5ODg1ODU3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243KB
MD506d08056c6f3c485db117b58a699ef26
SHA14609fc58af548815b2f25f86b72183580d7b74c1
SHA2569eb096ceb2493603d21bed948493684583718481145c1ca7ebfd67b04f92e4aa
SHA512ab7bb91d7fa140e149b9f4487abf816f4ac457ea0ec064b592490d07cc12d8155d9fe04208ad129ff216a23b356c12d15be32a35b659ecfd30389616a6cd90d5
-
Filesize
28KB
MD57de7f4b5d9b1a78e48bd9369aadd7573
SHA13bd7b7e69b21652ba3ab184614d256cb9aaba960
SHA256596cd96ba3052123d852e3fe5f20cc8e3ac51bd6c3fb08b13bd405b6df394d18
SHA512b67c45745307b168361cbd767d64f609935be22732de074e6ce4ba609ccf73bfdcc2f717f0e45a2eec5cb6df07f282c1b3c2a5529b04734d1f37c0b341f6e085
-
Filesize
1.1MB
MD51b941eb0d1776fc0a50f6a68162e0cb2
SHA159528929deb3d83d73b57fc68487b2edd41d7b95
SHA25674a376edcff8224f1dcbb9f18ff4f10251e149f2073d9d0e0364ac5a0c599e88
SHA5127a52449d6d9238ca0cce15ea51387aabe09e85b25b8e32fab6b3909b38f941fe87ae9b8239f5ab6d3c0beb18b75cf1b578dc3aaaae3553c60a2c8e1d3dd08e68