Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
PO# ENQ8864.Pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO# ENQ8864.Pdf.exe
Resource
win10v2004-20250217-en
General
-
Target
PO# ENQ8864.Pdf.exe
-
Size
1.2MB
-
MD5
ce5d04c4d15b7ae968c0f2cd2a81387d
-
SHA1
4d7334d66cdff4a0f1c3ddce81db245a1e3469c2
-
SHA256
74feceb928f3cd0ca47312eac2718f4210bce399335fd341bdeb456b2a09a230
-
SHA512
4f2e621a18373f71fdcb583e4c0777be10913ec41647f12919efef5b54d762170199e2e84e347f84a447f388ba3f1b61336f0d1e607988a3b0b061645f58445e
-
SSDEEP
24576:K5xolYQY6Du6J33O0c+JY5UZ+XC0kGso6Faa1Bs3jWY3:dYSu0c++OCvkGs9FaavsSY3
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.frmontajes.com - Port:
25 - Username:
[email protected] - Password:
1Guelas+1986 - Email To:
[email protected]
https://api.telegram.org/bot7391124277:AAEAD7k2_c00owq0kQIitLTWNNPqqi9m41c/sendMessage?chat_id=7128988401
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe -
Executes dropped EXE 6 IoCs
pid Process 4056 po# enq8864.pdf.exe 1404 icsys.icn.exe 2788 explorer.exe 412 spoolsv.exe 2276 svchost.exe 2268 spoolsv.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 reallyfreegeoip.org 15 checkip.dyndns.org 21 reallyfreegeoip.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000b000000023b8a-7.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4056 set thread context of 4448 4056 po# enq8864.pdf.exe 96 -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO# ENQ8864.Pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language po# enq8864.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1404 icsys.icn.exe 1404 icsys.icn.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2276 svchost.exe 2788 explorer.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2788 explorer.exe 2788 explorer.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2276 svchost.exe 2788 explorer.exe 2276 svchost.exe 2276 svchost.exe 2788 explorer.exe 2788 explorer.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2276 svchost.exe 2788 explorer.exe 2276 svchost.exe 2276 svchost.exe 2788 explorer.exe 2276 svchost.exe 2788 explorer.exe 2788 explorer.exe 2788 explorer.exe 2276 svchost.exe 2276 svchost.exe 2788 explorer.exe 2276 svchost.exe 2788 explorer.exe 2276 svchost.exe 2276 svchost.exe 2788 explorer.exe 2276 svchost.exe 2788 explorer.exe 2788 explorer.exe 2276 svchost.exe 2788 explorer.exe 2276 svchost.exe 4448 RegSvcs.exe 2276 svchost.exe 2788 explorer.exe 2788 explorer.exe 2276 svchost.exe 2276 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2788 explorer.exe 2276 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4056 po# enq8864.pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4448 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4056 po# enq8864.pdf.exe 4056 po# enq8864.pdf.exe 4056 po# enq8864.pdf.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4056 po# enq8864.pdf.exe 4056 po# enq8864.pdf.exe 4056 po# enq8864.pdf.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 5084 PO# ENQ8864.Pdf.exe 5084 PO# ENQ8864.Pdf.exe 1404 icsys.icn.exe 1404 icsys.icn.exe 2788 explorer.exe 2788 explorer.exe 412 spoolsv.exe 412 spoolsv.exe 2276 svchost.exe 2276 svchost.exe 2268 spoolsv.exe 2268 spoolsv.exe 2788 explorer.exe 2788 explorer.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 5084 wrote to memory of 4056 5084 PO# ENQ8864.Pdf.exe 88 PID 5084 wrote to memory of 4056 5084 PO# ENQ8864.Pdf.exe 88 PID 5084 wrote to memory of 4056 5084 PO# ENQ8864.Pdf.exe 88 PID 5084 wrote to memory of 1404 5084 PO# ENQ8864.Pdf.exe 89 PID 5084 wrote to memory of 1404 5084 PO# ENQ8864.Pdf.exe 89 PID 5084 wrote to memory of 1404 5084 PO# ENQ8864.Pdf.exe 89 PID 1404 wrote to memory of 2788 1404 icsys.icn.exe 90 PID 1404 wrote to memory of 2788 1404 icsys.icn.exe 90 PID 1404 wrote to memory of 2788 1404 icsys.icn.exe 90 PID 2788 wrote to memory of 412 2788 explorer.exe 91 PID 2788 wrote to memory of 412 2788 explorer.exe 91 PID 2788 wrote to memory of 412 2788 explorer.exe 91 PID 412 wrote to memory of 2276 412 spoolsv.exe 92 PID 412 wrote to memory of 2276 412 spoolsv.exe 92 PID 412 wrote to memory of 2276 412 spoolsv.exe 92 PID 2276 wrote to memory of 2268 2276 svchost.exe 93 PID 2276 wrote to memory of 2268 2276 svchost.exe 93 PID 2276 wrote to memory of 2268 2276 svchost.exe 93 PID 2276 wrote to memory of 2504 2276 svchost.exe 94 PID 2276 wrote to memory of 2504 2276 svchost.exe 94 PID 2276 wrote to memory of 2504 2276 svchost.exe 94 PID 4056 wrote to memory of 4448 4056 po# enq8864.pdf.exe 96 PID 4056 wrote to memory of 4448 4056 po# enq8864.pdf.exe 96 PID 4056 wrote to memory of 4448 4056 po# enq8864.pdf.exe 96 PID 4056 wrote to memory of 4448 4056 po# enq8864.pdf.exe 96 PID 2276 wrote to memory of 4784 2276 svchost.exe 100 PID 2276 wrote to memory of 4784 2276 svchost.exe 100 PID 2276 wrote to memory of 4784 2276 svchost.exe 100 PID 2276 wrote to memory of 1292 2276 svchost.exe 102 PID 2276 wrote to memory of 1292 2276 svchost.exe 102 PID 2276 wrote to memory of 1292 2276 svchost.exe 102 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO# ENQ8864.Pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO# ENQ8864.Pdf.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5084 -
\??\c:\users\admin\appdata\local\temp\po# enq8864.pdf.exe"c:\users\admin\appdata\local\temp\po# enq8864.pdf.exe "2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"c:\users\admin\appdata\local\temp\po# enq8864.pdf.exe "3⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4448
-
-
-
C:\Users\Admin\AppData\Local\icsys.icn.exeC:\Users\Admin\AppData\Local\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:412 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe5⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2268
-
-
C:\Windows\SysWOW64\at.exeat 08:20 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵
- System Location Discovery: System Language Discovery
PID:2504
-
-
C:\Windows\SysWOW64\at.exeat 08:21 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵
- System Location Discovery: System Language Discovery
PID:4784
-
-
C:\Windows\SysWOW64\at.exeat 08:22 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe6⤵
- System Location Discovery: System Language Discovery
PID:1292
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
990KB
MD509116ff12f2338350afa3daa9456fd82
SHA12dee1fc92e2c16b7ae08df60c20b009535a934c8
SHA256a2348624313de5d142fb8bea25335b37aa7ce22515e55d63093830b23d8aee75
SHA5127e8dbd9791163ff7dfbb3a31abf32cfc69794e6b7e8d0b0ff454895e7d2e060decdd13a79ba96beb8400120c4952b8e96287dbda9b56696bd1c379a5ebed2138
-
Filesize
274KB
MD524a924dc08b89e69e1319e9489a65614
SHA16e8b3b374ab5ec6f1e282151a002b35ed0f200e4
SHA25667eb69b20adc8794c6e7fce09ca2366e086f3421c081cff6711df1a8bd9c03b6
SHA512c1b7fce1e07b967bddd806f024278d7aee950ebeff5e03e9fd219baff10b2ae28de15c47327feef4cc1057a9187866f5bae1e7b35b3d1236971ffcedca4a9665
-
Filesize
274KB
MD57d8f41e2d6225f8a3da6c2c9e44769aa
SHA149ce8c21aa84b86c07965038900f4e7e268ab13b
SHA2563344be325f6c69c98e54de87a5d487a13cfb0ba9b57e31f34b1f5f5c61b7fe65
SHA512d35680ae07eea0f083856fcb38cf7722ac856738c07261d5df8ece708f24cf013bf548854f15d7534796003db463f0fca75b6c30d314660a6d0634a0db1277cd
-
Filesize
274KB
MD5401d39fd7eeb04690489e41e2b27f59f
SHA16b0f32bb171016c622f4e0d525e60c10e5b38a99
SHA2564f006a8208eab488947ea57967a2a7667ba017f48ed23e10d31686eea99c3be1
SHA51297219837fc21d3e1359f3cc2c07a08e5f1deb919308dd76159188816ba6279fbba711c80e31ee8d1f954081b191e1efcc0a5b0d12b4aaefb965c6fe021f158ad
-
Filesize
274KB
MD5806dd47475bb8379054e77f3be0272bf
SHA1a9ecba4e68ca9109cbc84b347294d16a618e4a47
SHA256684c2a31c615fc7d5cdaa3904cb621e7fb846a2035fbad86ec46e746672bdb7c
SHA512af0a008bdf80265f1912ade00e457f43c50d20c15d588f4b749a0cb80bb2561078817c76261390ac55b78e11d372c89e7ed46665d1bde06142e310f38ab2b1d0
-
Filesize
274KB
MD5d00a619e0b51dc8e3c76947a7df816a1
SHA1726ee5bdb4c0c8a9d21a560ed9a2083fa98f6c2f
SHA2560425857b4f70f112486bfde6f3d588bd5e7d9dd659beb8644cbcffdd757b2c2f
SHA5126e0e3bc35a8f44a52d5a0e8bec78cf2e0106351b371cc4c1d8ecef35a716eae3ef07deae9c3785b3516ab5b0ec67383e8248040c2d2915165122292135396caa