Analysis
-
max time kernel
132s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order WPO28029.com.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Purchase Order WPO28029.com.exe
Resource
win10v2004-20250217-en
General
-
Target
Purchase Order WPO28029.com.exe
-
Size
828KB
-
MD5
c4effd60da72843a91071bd75c2f6af7
-
SHA1
3ec8afb98887a9add9fd509f0d0db603b896ae21
-
SHA256
d3f69f494a1af0ea7a7dbf4307082c24e7bd1b91f29f258605d8ddfa3400ac4b
-
SHA512
f30b7b98ddc45bd87c58c41d1022cdd4b29c3bbc686d8c17998bacc102b5eac6f9d52f6d6aadc3959e73967622ada4ecc8d9f0b0ba65e7db23d635a27c61259c
-
SSDEEP
12288:xMSSMsarSgOVK/EHawVlm/qNwv2bgigiQvArLmMRA:x1fDriFuT2bgfiuALq
Malware Config
Extracted
vipkeylogger
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1192 created 3388 1192 Purchase Order WPO28029.com.exe 56 -
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation Purchase Order WPO28029.com.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\page.vbs Purchase Order WPO28029.com.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 checkip.dyndns.org 25 reallyfreegeoip.org 26 reallyfreegeoip.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1192 set thread context of 4656 1192 Purchase Order WPO28029.com.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase Order WPO28029.com.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 3772 ipconfig.exe 4600 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 924 powershell.exe 924 powershell.exe 1192 Purchase Order WPO28029.com.exe 1192 Purchase Order WPO28029.com.exe 1192 Purchase Order WPO28029.com.exe 4656 InstallUtil.exe 4656 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1192 Purchase Order WPO28029.com.exe Token: SeDebugPrivilege 924 powershell.exe Token: SeDebugPrivilege 1192 Purchase Order WPO28029.com.exe Token: SeDebugPrivilege 4656 InstallUtil.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1192 wrote to memory of 3556 1192 Purchase Order WPO28029.com.exe 88 PID 1192 wrote to memory of 3556 1192 Purchase Order WPO28029.com.exe 88 PID 1192 wrote to memory of 3556 1192 Purchase Order WPO28029.com.exe 88 PID 3556 wrote to memory of 3772 3556 cmd.exe 90 PID 3556 wrote to memory of 3772 3556 cmd.exe 90 PID 3556 wrote to memory of 3772 3556 cmd.exe 90 PID 1192 wrote to memory of 924 1192 Purchase Order WPO28029.com.exe 91 PID 1192 wrote to memory of 924 1192 Purchase Order WPO28029.com.exe 91 PID 1192 wrote to memory of 924 1192 Purchase Order WPO28029.com.exe 91 PID 1192 wrote to memory of 4656 1192 Purchase Order WPO28029.com.exe 93 PID 1192 wrote to memory of 4656 1192 Purchase Order WPO28029.com.exe 93 PID 1192 wrote to memory of 4656 1192 Purchase Order WPO28029.com.exe 93 PID 1192 wrote to memory of 4656 1192 Purchase Order WPO28029.com.exe 93 PID 1192 wrote to memory of 4656 1192 Purchase Order WPO28029.com.exe 93 PID 1192 wrote to memory of 4656 1192 Purchase Order WPO28029.com.exe 93 PID 1192 wrote to memory of 4656 1192 Purchase Order WPO28029.com.exe 93 PID 1192 wrote to memory of 4656 1192 Purchase Order WPO28029.com.exe 93 PID 1192 wrote to memory of 4656 1192 Purchase Order WPO28029.com.exe 93 PID 1192 wrote to memory of 5752 1192 Purchase Order WPO28029.com.exe 94 PID 1192 wrote to memory of 5752 1192 Purchase Order WPO28029.com.exe 94 PID 1192 wrote to memory of 5752 1192 Purchase Order WPO28029.com.exe 94 PID 5752 wrote to memory of 4600 5752 cmd.exe 96 PID 5752 wrote to memory of 4600 5752 cmd.exe 96 PID 5752 wrote to memory of 4600 5752 cmd.exe 96 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order WPO28029.com.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order WPO28029.com.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3772
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:924
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5752 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:4600
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82