Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2025 11:55
Static task
static1
Behavioral task
behavioral1
Sample
Polylogy.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Polylogy.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
General
-
Target
Polylogy.exe
-
Size
990KB
-
MD5
7661aaf5dbaccb77ebf948bc69b5725d
-
SHA1
791ccb6267488a0d86891ae25be93a36a6b5bedd
-
SHA256
510877d9cee23c4fc8a3f0a96b12a175f1dbe887978f43499eb1cc2d05571ffb
-
SHA512
19cad72428ed242a9c5d743ade6ed3486a8d2454cd98d555d2b2df3f77848162bf1a1dbba0bbfd8d5f39676ff0d82dc0ea87efa73a80f9680eaad7ba7a5eb7c0
-
SSDEEP
24576:IGhzpxfOytYgk/ZLpIK3MrFNbMUqkpg7bII6vJ2FYMU07m1iQ:zrKz/irFNb+k2bsxTt8mkQ
Malware Config
Extracted
vipkeylogger
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Loads dropped DLL 2 IoCs
pid Process 4080 Polylogy.exe 4080 Polylogy.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Polylogy.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Polylogy.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Polylogy.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 drive.google.com 10 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 checkip.dyndns.org 38 reallyfreegeoip.org 39 reallyfreegeoip.org -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\revyviserne\Tilbed.ini Polylogy.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4544 Polylogy.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4080 Polylogy.exe 4544 Polylogy.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\delarbejderne.nar Polylogy.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\fremmder\ifaldne.lev Polylogy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Polylogy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Polylogy.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4544 Polylogy.exe 4544 Polylogy.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4080 Polylogy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4544 Polylogy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4080 wrote to memory of 4544 4080 Polylogy.exe 86 PID 4080 wrote to memory of 4544 4080 Polylogy.exe 86 PID 4080 wrote to memory of 4544 4080 Polylogy.exe 86 PID 4080 wrote to memory of 4544 4080 Polylogy.exe 86 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Polylogy.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Polylogy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Polylogy.exe"C:\Users\Admin\AppData\Local\Temp\Polylogy.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\Polylogy.exe"C:\Users\Admin\AppData\Local\Temp\Polylogy.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4544
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c129d8376c6f450c2a20f13228ace9c4
SHA17d43dd06beb4509fd35c0fcd711117d45c12725d
SHA256eab6f890d4239205fc6777bdf0b4a81929ec077bfb00ae5b9f6c84a3f5009d16
SHA512d008470bc432870b2a3e277057ce81090234f18f1a5f7f1c03003a9b1b8dce81d33193ec3676d64eddf8c79e68b92a110e8cb6be517006a1a4d7019ddc3029c0
-
Filesize
11KB
MD5b853d5d2361ade731e33e882707efc34
SHA1c58b1aeabdf1cbb8334ef8797e7aceaa7a1cb6be
SHA256f0cd96e0b6e40f92ad1aa0efacde833bae807b92fca19bf062c1cf8acf29484b
SHA5128ea31d82ffa6f58dab5632fe72690d3a6db0be65aec85fc8a1f71626773c0974dcebefae17bcf67c4c56ef442545e985eea0b348ff6e4fc36740640092b08d69