Analysis
-
max time kernel
121s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2025, 02:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://f005.backblazeb2.com/file/bobbyvi/ceosnak/PO202501B.zip
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
https://f005.backblazeb2.com/file/bobbyvi/ceosnak/PO202501B.zip
Resource
win10ltsc2021-20250217-en
General
-
Target
https://f005.backblazeb2.com/file/bobbyvi/ceosnak/PO202501B.zip
Malware Config
Extracted
Protocol: smtp- Host:
mail.groupscrea.com - Port:
587 - Username:
[email protected] - Password:
cletus1905@
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.groupscrea.com - Port:
587 - Username:
[email protected] - Password:
cletus1905@ - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 reallyfreegeoip.org 30 reallyfreegeoip.org 35 reallyfreegeoip.org 26 checkip.dyndns.org -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133844041996695521" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2004 chrome.exe 2004 chrome.exe 5000 AddInProcess32.exe 5000 AddInProcess32.exe 4540 installutil.exe 4540 installutil.exe 5000 AddInProcess32.exe 4540 installutil.exe 4540 installutil.exe 4540 installutil.exe 4540 installutil.exe 4540 installutil.exe 4540 installutil.exe 4540 installutil.exe 4540 installutil.exe 4540 installutil.exe 4540 installutil.exe 4540 installutil.exe 4540 installutil.exe 4540 installutil.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2004 chrome.exe 2004 chrome.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeDebugPrivilege 5000 AddInProcess32.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeShutdownPrivilege 2004 chrome.exe Token: SeCreatePagefilePrivilege 2004 chrome.exe Token: SeDebugPrivilege 4540 installutil.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe 2004 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1752 2004 chrome.exe 87 PID 2004 wrote to memory of 1752 2004 chrome.exe 87 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2700 2004 chrome.exe 88 PID 2004 wrote to memory of 2208 2004 chrome.exe 89 PID 2004 wrote to memory of 2208 2004 chrome.exe 89 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 PID 2004 wrote to memory of 956 2004 chrome.exe 90 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://f005.backblazeb2.com/file/bobbyvi/ceosnak/PO202501B.zip1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffab121cc40,0x7ffab121cc4c,0x7ffab121cc582⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1816,i,18378830193523151354,13610163662790596688,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1812 /prefetch:22⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2084,i,18378830193523151354,13610163662790596688,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2100 /prefetch:32⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,18378830193523151354,13610163662790596688,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2416 /prefetch:82⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,18378830193523151354,13610163662790596688,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,18378830193523151354,13610163662790596688,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4812,i,18378830193523151354,13610163662790596688,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4568,i,18378830193523151354,13610163662790596688,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4784 /prefetch:82⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1124
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4672
-
C:\Users\Admin\Downloads\PO202501B\PO202501B.exe"C:\Users\Admin\Downloads\PO202501B\PO202501B.exe"1⤵PID:4052
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:2976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5418d098aeb7f3c0d222f6865679f4502
SHA131955ca5c24737ca5c4485635d6f3b99c10dee71
SHA2564f7f9e30a56cc4b0dad431da192142009e4f9e30d991327a8296db5201a54fc5
SHA5128d0bd09dfe8a0af28f310b8959e10c3a991599d06a2d7febdcbf7d73196440a9007c4962f68b19f750a3cffb7d05c23337697b0557c67e3ca311b2c01215b996
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD5dfc3c66650c62808e6ba8b9c1dff7673
SHA13f4021b7ac6b96887ea0e54f022979d7c5e7f186
SHA2561ae49773c978329169adcd450f8b1dae66b40cd427fbed0c84e0ae8e18201ebb
SHA512b55fc1e4037f6ad15d4354b0c1a04fb41328a70ea1214064ec9ea719e0da336f74843fd367999e7d2cff79023e9de90b780db8ddda43fa4767765cfdce7baa0b
-
Filesize
8KB
MD58ac4a3d2f4eaec12e25aa9e573bcc130
SHA1766cc1de4ccf0bd7633cdceb4c8caa8febbc8bf0
SHA256ca69a4c3067bde53887c42f663f3f0e6cbcb81bc00aae7a544d8e4cfd7d8f557
SHA51256e293ddce7b02ebf083e5d0bf525856d65a0b28a53a575722294f8ccfbdccab0abc3d1878a5014811788027d5c3d321f11dc7af4815e050289f63798fa46b34
-
Filesize
123KB
MD574790ad893dc5dabb6da0ad391dedfaf
SHA17d0852d9afbff8c9869fb8757d374ce44d13e6ee
SHA2565f70d69fd1001e7cd47667282083d454cbe60b30fea07ee746c7debf043ac469
SHA5125036c5dca6b95a016bf472aacfdfd38cdda629fa3389baaeaead3bf9d9457e723bb7ff13f113c7a475229d71772c36fa82b9a039042b4e67e488a29f0bebd6f0
-
Filesize
1.6MB
MD559119f37bec2cdea4b2777f4afe4a203
SHA11d073a3170c9f2425df56ca08e1a00ac2d526246
SHA25626452bc527e96dc49c07a506f363c92ad485dc087a1d5c6ad4e5c64c1b463ef2
SHA5127c7e634aa7f27fe091de2e6da782e5ed462ad10eefa22794f017c838674f1ad84de7ebbaf91d492cb45600fe0d8abd84d850719963ca488835ab135c80504e5f