Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-02-2025 14:05
Static task
static1
Behavioral task
behavioral1
Sample
Polylogy.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Polylogy.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
General
-
Target
Polylogy.exe
-
Size
990KB
-
MD5
7661aaf5dbaccb77ebf948bc69b5725d
-
SHA1
791ccb6267488a0d86891ae25be93a36a6b5bedd
-
SHA256
510877d9cee23c4fc8a3f0a96b12a175f1dbe887978f43499eb1cc2d05571ffb
-
SHA512
19cad72428ed242a9c5d743ade6ed3486a8d2454cd98d555d2b2df3f77848162bf1a1dbba0bbfd8d5f39676ff0d82dc0ea87efa73a80f9680eaad7ba7a5eb7c0
-
SSDEEP
24576:IGhzpxfOytYgk/ZLpIK3MrFNbMUqkpg7bII6vJ2FYMU07m1iQ:zrKz/irFNb+k2bsxTt8mkQ
Malware Config
Extracted
vipkeylogger
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Loads dropped DLL 2 IoCs
pid Process 2292 Polylogy.exe 2292 Polylogy.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 5 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 checkip.dyndns.org 16 reallyfreegeoip.org 17 reallyfreegeoip.org -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\revyviserne\Tilbed.ini Polylogy.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1128 Polylogy.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2292 Polylogy.exe 1128 Polylogy.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\delarbejderne.nar Polylogy.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\fremmder\ifaldne.lev Polylogy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Polylogy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Polylogy.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1128 Polylogy.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2292 Polylogy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1128 Polylogy.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1128 2292 Polylogy.exe 31 PID 2292 wrote to memory of 1128 2292 Polylogy.exe 31 PID 2292 wrote to memory of 1128 2292 Polylogy.exe 31 PID 2292 wrote to memory of 1128 2292 Polylogy.exe 31 PID 2292 wrote to memory of 1128 2292 Polylogy.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Polylogy.exe"C:\Users\Admin\AppData\Local\Temp\Polylogy.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\Polylogy.exe"C:\Users\Admin\AppData\Local\Temp\Polylogy.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cb50f4d831d2209fb55338336f54a537
SHA1fed71816d27a6bdf2f053d2e8452f3a6321d5812
SHA25621d44c611c5c9fe1dbe44504299f9adbd70491711498c6ea53e212047c1f2ffd
SHA5120c8fa88140c468342ce068ffbf1092cb45a8c15fb7b0c7dcc7c7de78a785a4f478f517119789099a8aa93e0c98dc1c8b357408acb464687ce86ca561e0e1bd06
-
Filesize
11KB
MD5b853d5d2361ade731e33e882707efc34
SHA1c58b1aeabdf1cbb8334ef8797e7aceaa7a1cb6be
SHA256f0cd96e0b6e40f92ad1aa0efacde833bae807b92fca19bf062c1cf8acf29484b
SHA5128ea31d82ffa6f58dab5632fe72690d3a6db0be65aec85fc8a1f71626773c0974dcebefae17bcf67c4c56ef442545e985eea0b348ff6e4fc36740640092b08d69