Analysis
-
max time kernel
129s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18/02/2025, 12:03
Static task
static1
Behavioral task
behavioral1
Sample
rpaidInvoice.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
rpaidInvoice.exe
Resource
win10v2004-20250217-en
General
-
Target
rpaidInvoice.exe
-
Size
843KB
-
MD5
aeabfd0534b39c526c6617466af1d780
-
SHA1
7ffff117692cbcdeec136abd9bd7b15813d3ca35
-
SHA256
68765775002699ff32978e8cd956899391b045e273cf944cba0a4c13af820d18
-
SHA512
b7edcbda504deb93cfe9907eaf961dba3daf429e8d7f0442d6beab1e5741ced5810ba408d0787ef95e2a0d6b6169c4793223a05483b9c4c2c79540593c16010f
-
SSDEEP
12288:ROovHlb/a13/KiTO5rry72+QwfgivOKFd01e0B:RZle1vHTO5r9Cl0B
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
uniform.gr - Port:
587 - Username:
[email protected] - Password:
qkTHtoV5%]8% - Email To:
[email protected]
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\skype\\skype.exe," reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\skype\\skype.exe," reg.exe -
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation rpaidInvoice.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2860 skype.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2860 set thread context of 3584 2860 skype.exe 103 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2164 3584 WerFault.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skype.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rpaidInvoice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skype.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 7 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3844 cmd.exe 2136 PING.EXE 4812 cmd.exe 4020 PING.EXE 4380 cmd.exe 2360 PING.EXE 1044 PING.EXE -
Runs ping.exe 1 TTPs 4 IoCs
pid Process 1044 PING.EXE 2136 PING.EXE 4020 PING.EXE 2360 PING.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4092 rpaidInvoice.exe 4092 rpaidInvoice.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 1932 skype.exe 2860 skype.exe 2860 skype.exe 2860 skype.exe 3584 InstallUtil.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4092 rpaidInvoice.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4092 rpaidInvoice.exe Token: SeDebugPrivilege 1932 skype.exe Token: SeDebugPrivilege 2860 skype.exe Token: SeDebugPrivilege 3584 InstallUtil.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4092 wrote to memory of 3844 4092 rpaidInvoice.exe 87 PID 4092 wrote to memory of 3844 4092 rpaidInvoice.exe 87 PID 4092 wrote to memory of 3844 4092 rpaidInvoice.exe 87 PID 3844 wrote to memory of 2136 3844 cmd.exe 89 PID 3844 wrote to memory of 2136 3844 cmd.exe 89 PID 3844 wrote to memory of 2136 3844 cmd.exe 89 PID 4092 wrote to memory of 1932 4092 rpaidInvoice.exe 90 PID 4092 wrote to memory of 1932 4092 rpaidInvoice.exe 90 PID 4092 wrote to memory of 1932 4092 rpaidInvoice.exe 90 PID 1932 wrote to memory of 4812 1932 skype.exe 91 PID 1932 wrote to memory of 4812 1932 skype.exe 91 PID 1932 wrote to memory of 4812 1932 skype.exe 91 PID 4812 wrote to memory of 4020 4812 cmd.exe 93 PID 4812 wrote to memory of 4020 4812 cmd.exe 93 PID 4812 wrote to memory of 4020 4812 cmd.exe 93 PID 3844 wrote to memory of 4116 3844 cmd.exe 94 PID 3844 wrote to memory of 4116 3844 cmd.exe 94 PID 3844 wrote to memory of 4116 3844 cmd.exe 94 PID 1932 wrote to memory of 4380 1932 skype.exe 95 PID 1932 wrote to memory of 4380 1932 skype.exe 95 PID 1932 wrote to memory of 4380 1932 skype.exe 95 PID 4380 wrote to memory of 2360 4380 cmd.exe 97 PID 4380 wrote to memory of 2360 4380 cmd.exe 97 PID 4380 wrote to memory of 2360 4380 cmd.exe 97 PID 4812 wrote to memory of 412 4812 cmd.exe 100 PID 4812 wrote to memory of 412 4812 cmd.exe 100 PID 4812 wrote to memory of 412 4812 cmd.exe 100 PID 4380 wrote to memory of 1044 4380 cmd.exe 101 PID 4380 wrote to memory of 1044 4380 cmd.exe 101 PID 4380 wrote to memory of 1044 4380 cmd.exe 101 PID 4380 wrote to memory of 2860 4380 cmd.exe 102 PID 4380 wrote to memory of 2860 4380 cmd.exe 102 PID 4380 wrote to memory of 2860 4380 cmd.exe 102 PID 2860 wrote to memory of 3584 2860 skype.exe 103 PID 2860 wrote to memory of 3584 2860 skype.exe 103 PID 2860 wrote to memory of 3584 2860 skype.exe 103 PID 2860 wrote to memory of 3584 2860 skype.exe 103 PID 2860 wrote to memory of 3584 2860 skype.exe 103 PID 2860 wrote to memory of 3584 2860 skype.exe 103 PID 2860 wrote to memory of 3584 2860 skype.exe 103 PID 2860 wrote to memory of 3584 2860 skype.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\rpaidInvoice.exe"C:\Users\Admin\AppData\Local\Temp\rpaidInvoice.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 15 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe,"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 153⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2136
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe,"3⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:4116
-
-
-
C:\Users\Admin\AppData\Local\Temp\skype.exe"C:\Users\Admin\AppData\Local\Temp\skype.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 18 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe,"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 184⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4020
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe,"4⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:412
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 28 > nul && copy "C:\Users\Admin\AppData\Local\Temp\skype.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe" && ping 127.0.0.1 -n 28 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe"3⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 284⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2360
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 284⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1044
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 14486⤵
- Program crash
PID:2164
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3584 -ip 35841⤵PID:2880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56c55b06a4699767d955765958f7233fe
SHA182d1323b694e9c217d0792c5ed466b89adb8fc30
SHA256c5f2c8b47417b1b099f48964e09669704c349af2056560eb5812747d18cb3cd8
SHA512bb4c819892be21ef7f0e8f0f8caa23b047698461ef926f07ab7efd508630de56e7dc5cbde310b37b93cc556986e921799383d11f2dff7c377049d64d40c89487
-
Filesize
843KB
MD5aeabfd0534b39c526c6617466af1d780
SHA17ffff117692cbcdeec136abd9bd7b15813d3ca35
SHA25668765775002699ff32978e8cd956899391b045e273cf944cba0a4c13af820d18
SHA512b7edcbda504deb93cfe9907eaf961dba3daf429e8d7f0442d6beab1e5741ced5810ba408d0787ef95e2a0d6b6169c4793223a05483b9c4c2c79540593c16010f