Analysis

  • max time kernel
    148s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    19/02/2025, 10:12

General

  • Target

    BugSplat64.dll

  • Size

    8.5MB

  • MD5

    1ff0255fb75d95d65da33e95cc93d871

  • SHA1

    5e59e19d377381faa9c842b3abc53cd1d15c6451

  • SHA256

    b28a3906a0ea16e8766f9c14ed934e1f689cf5b0d95c5463bd3e4de97873c046

  • SHA512

    b4c693f3499be2a7b38f68caf9241f7f3fe917b329e480420270e342c7a7d398747700ee33de05e08b52bc5ca3b4636ade3a01cc299006d01f0c4cb88a4ceaa4

  • SSDEEP

    98304:1gaqeCWnlBVJKsWZiV5wn6dMPdXPE7m2PPf1Gf6:iaqeznl/wsWZiVG6I2NGf

Malware Config

Extracted

Family

vipkeylogger

Signatures

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Vipkeylogger family
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\BugSplat64.dll,#1
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"
      2⤵
        PID:1748
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
        2⤵
          PID:2576
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"
          2⤵
            PID:2372
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
            2⤵
              PID:2404
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"
              2⤵
                PID:2564
              • C:\Windows\System32\calc.exe
                "C:\Windows\System32\calc.exe"
                2⤵
                  PID:2756
                • C:\Windows\System32\svchost.exe
                  "C:\Windows\System32\svchost.exe"
                  2⤵
                    PID:2868
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe"
                    2⤵
                      PID:2792
                    • C:\Windows\System32\notepad.exe
                      "C:\Windows\System32\notepad.exe"
                      2⤵
                        PID:2892
                      • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                        "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
                        2⤵
                        • Accesses Microsoft Outlook profiles
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • outlook_office_path
                        • outlook_win_path
                        PID:2704

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • memory/1584-0-0x0000000000390000-0x00000000003A0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1748-1-0x0000000000400000-0x0000000000450000-memory.dmp

                      Filesize

                      320KB

                    • memory/1748-5-0x0000000000400000-0x0000000000450000-memory.dmp

                      Filesize

                      320KB

                    • memory/1748-9-0x0000000000400000-0x0000000000450000-memory.dmp

                      Filesize

                      320KB

                    • memory/1748-7-0x0000000000400000-0x0000000000450000-memory.dmp

                      Filesize

                      320KB

                    • memory/1748-3-0x0000000000400000-0x0000000000450000-memory.dmp

                      Filesize

                      320KB

                    • memory/2704-85-0x0000000000400000-0x0000000000450000-memory.dmp

                      Filesize

                      320KB

                    • memory/2704-86-0x00000000741EE000-0x00000000741EF000-memory.dmp

                      Filesize

                      4KB

                    • memory/2704-87-0x00000000004A0000-0x00000000004F0000-memory.dmp

                      Filesize

                      320KB

                    • memory/2704-88-0x00000000741E0000-0x00000000748CE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2704-89-0x00000000741E0000-0x00000000748CE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2704-90-0x00000000741E0000-0x00000000748CE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2704-91-0x00000000020D0000-0x0000000002120000-memory.dmp

                      Filesize

                      320KB

                    • memory/2704-92-0x00000000741E0000-0x00000000748CE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2704-93-0x0000000000400000-0x0000000000450000-memory.dmp

                      Filesize

                      320KB

                    • memory/2704-94-0x00000000741EE000-0x00000000741EF000-memory.dmp

                      Filesize

                      4KB

                    • memory/2704-95-0x00000000741E0000-0x00000000748CE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2704-96-0x00000000741E0000-0x00000000748CE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2704-97-0x00000000741E0000-0x00000000748CE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2704-98-0x00000000741E0000-0x00000000748CE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2704-99-0x00000000741E0000-0x00000000748CE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2704-100-0x00000000741E0000-0x00000000748CE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2704-101-0x00000000741E0000-0x00000000748CE000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2704-102-0x00000000741E0000-0x00000000748CE000-memory.dmp

                      Filesize

                      6.9MB