Analysis

  • max time kernel
    139s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    21-02-2025 03:50

General

  • Target

    AUTO SPARE PARTS LIST.exe

  • Size

    970KB

  • MD5

    ad4710de6439164971bcf0697dd25a55

  • SHA1

    ddbbf71511509b36fcafb71238e170769f590155

  • SHA256

    e9d87b999454486eb4f2d0befeb0ed7d82e59cc0cee03a646e0f5474a2610da6

  • SHA512

    00d84130a34046712f96590917b619e329806f8b8caf1e59beadd879c42a4a7fdf7e7eab335c7bfc14ff34a6719a252a8eb0a42a03e93982004b9941b9b5a5e8

  • SSDEEP

    12288:GYw1J/aQC2PqFOZzwWQ1vApLdckCDszpkU9e/pV8O/tCnfZs0aLEcsUV:i/8gJwKJdckCDSpkoehVvCfZUL7V

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7155890739:AAGk0jbDV2gAazIReZKFh86ZKJt--qaC54w/sendMessage?chat_id=1886630858

Signatures

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Vipkeylogger family
  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AUTO SPARE PARTS LIST.exe
    "C:\Users\Admin\AppData\Local\Temp\AUTO SPARE PARTS LIST.exe"
    1⤵
    • Drops startup file
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c ping 127.0.0.1 -n 38 > nul && copy "C:\Users\Admin\AppData\Local\Temp\AUTO SPARE PARTS LIST.exe" "C:\Users\Admin\Desktop\AUTO SPARE PARTS LIST.exe" && ping 127.0.0.1 -n 38 > nul && "C:\Users\Admin\Desktop\AUTO SPARE PARTS LIST.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 38
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2792
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 38
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2684
      • C:\Users\Admin\Desktop\AUTO SPARE PARTS LIST.exe
        "C:\Users\Admin\Desktop\AUTO SPARE PARTS LIST.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1920
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:2124
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            4⤵
              PID:1496

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \Users\Admin\Desktop\AUTO SPARE PARTS LIST.exe

        Filesize

        970KB

        MD5

        ad4710de6439164971bcf0697dd25a55

        SHA1

        ddbbf71511509b36fcafb71238e170769f590155

        SHA256

        e9d87b999454486eb4f2d0befeb0ed7d82e59cc0cee03a646e0f5474a2610da6

        SHA512

        00d84130a34046712f96590917b619e329806f8b8caf1e59beadd879c42a4a7fdf7e7eab335c7bfc14ff34a6719a252a8eb0a42a03e93982004b9941b9b5a5e8

      • memory/1920-22-0x00000000003F0000-0x000000000040A000-memory.dmp

        Filesize

        104KB

      • memory/1920-23-0x0000000000470000-0x0000000000476000-memory.dmp

        Filesize

        24KB

      • memory/1920-19-0x0000000074030000-0x000000007471E000-memory.dmp

        Filesize

        6.9MB

      • memory/1920-21-0x0000000074030000-0x000000007471E000-memory.dmp

        Filesize

        6.9MB

      • memory/1920-20-0x0000000074030000-0x000000007471E000-memory.dmp

        Filesize

        6.9MB

      • memory/1920-18-0x0000000001100000-0x00000000011F6000-memory.dmp

        Filesize

        984KB

      • memory/2124-28-0x0000000000090000-0x00000000000D8000-memory.dmp

        Filesize

        288KB

      • memory/2124-32-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2124-26-0x0000000000090000-0x00000000000D8000-memory.dmp

        Filesize

        288KB

      • memory/2124-30-0x0000000000090000-0x00000000000D8000-memory.dmp

        Filesize

        288KB

      • memory/2124-24-0x0000000000090000-0x00000000000D8000-memory.dmp

        Filesize

        288KB

      • memory/2368-7-0x0000000074080000-0x000000007476E000-memory.dmp

        Filesize

        6.9MB

      • memory/2368-0-0x000000007408E000-0x000000007408F000-memory.dmp

        Filesize

        4KB

      • memory/2368-5-0x000000007408E000-0x000000007408F000-memory.dmp

        Filesize

        4KB

      • memory/2368-3-0x0000000074080000-0x000000007476E000-memory.dmp

        Filesize

        6.9MB

      • memory/2368-1-0x0000000000390000-0x0000000000486000-memory.dmp

        Filesize

        984KB

      • memory/2368-2-0x0000000000490000-0x00000000004B6000-memory.dmp

        Filesize

        152KB

      • memory/2368-6-0x0000000074080000-0x000000007476E000-memory.dmp

        Filesize

        6.9MB