Analysis
-
max time kernel
65s -
max time network
59s -
platform
windows11-21h2_x64 -
resource
win11-20250217-es -
resource tags
arch:x64arch:x86image:win11-20250217-eslocale:es-esos:windows11-21h2-x64systemwindows -
submitted
24/02/2025, 17:59
Static task
static1
Behavioral task
behavioral1
Sample
d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe
Resource
win11-20250217-es
General
-
Target
d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe
-
Size
1.8MB
-
MD5
7ccc26b2bcf3c42eafba802543915630
-
SHA1
61e6f11c1dd8ae33c0f53f3bfc8fe196784db899
-
SHA256
d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff
-
SHA512
1c8c0f37acb79d8d7c3b260341b8f0b8043071e55a84ba7a7072217659bc1ce1fa69420c3463326aba9e1ad4b7764dbaf2424eac19f8d9a4f5af79b0f91cd1a6
-
SSDEEP
24576:CWF97YPear/DtoCsSkWnFRRGISMS2+t+R3qOzi58Uv7peej10vn+bg85PLfVjZ5V:CWFuLZoC0CGIAOzi6UDpeeBYEtdZSW
Malware Config
Extracted
Protocol: smtp- Host:
ssl0.ovh.net - Port:
587 - Username:
[email protected] - Password:
sj4Ub78kk
Extracted
vipkeylogger
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/4832-3-0x0000000003070000-0x0000000004070000-memory.dmp modiloader_stage2 -
Executes dropped EXE 5 IoCs
pid Process 3508 ndpha.pif 4668 svchost.pif 4916 alpha.pif 3084 aken.pif 1400 jhaqozvD.pif -
Loads dropped DLL 1 IoCs
pid Process 4668 svchost.pif -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jhaqozvD.pif Key opened \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jhaqozvD.pif Key opened \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jhaqozvD.pif -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dvzoqahj = "C:\\Users\\Public\\Dvzoqahj.url" d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 checkip.dyndns.org 1 reallyfreegeoip.org 3 reallyfreegeoip.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4832 set thread context of 1400 4832 d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhaqozvD.pif -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3084 aken.pif 3084 aken.pif 1400 jhaqozvD.pif 1400 jhaqozvD.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3084 aken.pif Token: SeDebugPrivilege 1400 jhaqozvD.pif -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 4832 wrote to memory of 2108 4832 d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe 81 PID 4832 wrote to memory of 2108 4832 d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe 81 PID 4832 wrote to memory of 2108 4832 d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe 81 PID 4832 wrote to memory of 2928 4832 d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe 83 PID 4832 wrote to memory of 2928 4832 d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe 83 PID 4832 wrote to memory of 2928 4832 d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe 83 PID 2928 wrote to memory of 3460 2928 cmd.exe 85 PID 2928 wrote to memory of 3460 2928 cmd.exe 85 PID 2928 wrote to memory of 3460 2928 cmd.exe 85 PID 2928 wrote to memory of 3508 2928 cmd.exe 86 PID 2928 wrote to memory of 3508 2928 cmd.exe 86 PID 2928 wrote to memory of 3508 2928 cmd.exe 86 PID 3508 wrote to memory of 4668 3508 ndpha.pif 87 PID 3508 wrote to memory of 4668 3508 ndpha.pif 87 PID 4668 wrote to memory of 1700 4668 svchost.pif 88 PID 4668 wrote to memory of 1700 4668 svchost.pif 88 PID 1700 wrote to memory of 3428 1700 cmd.exe 90 PID 1700 wrote to memory of 3428 1700 cmd.exe 90 PID 1700 wrote to memory of 4712 1700 cmd.exe 91 PID 1700 wrote to memory of 4712 1700 cmd.exe 91 PID 1700 wrote to memory of 4356 1700 cmd.exe 92 PID 1700 wrote to memory of 4356 1700 cmd.exe 92 PID 1700 wrote to memory of 4916 1700 cmd.exe 93 PID 1700 wrote to memory of 4916 1700 cmd.exe 93 PID 4916 wrote to memory of 3084 4916 alpha.pif 94 PID 4916 wrote to memory of 3084 4916 alpha.pif 94 PID 4832 wrote to memory of 1400 4832 d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe 95 PID 4832 wrote to memory of 1400 4832 d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe 95 PID 4832 wrote to memory of 1400 4832 d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe 95 PID 4832 wrote to memory of 1400 4832 d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe 95 PID 4832 wrote to memory of 1400 4832 d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe 95 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jhaqozvD.pif -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1298619118-249045975-4264763259-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jhaqozvD.pif
Processes
-
C:\Users\Admin\AppData\Local\Temp\d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe"C:\Users\Admin\AppData\Local\Temp\d68140344862d46ab8705ca552c71b0c956071d1a552d0c438e246142fe298ff.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\DvzoqahjF.cmd" "2⤵
- System Location Discovery: System Language Discovery
PID:2108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\\Dvzoqahj27.cmd" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\rundll32.exe C:\\Users\\Public\\ndpha.pif3⤵
- System Location Discovery: System Language Discovery
PID:3460
-
-
C:\Users\Public\ndpha.pifC:\\Users\\Public\\ndpha.pif zipfldr.dll,RouteTheCall C:\Windows \SysWOW64\svchost.pif3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows \SysWOW64\svchost.pif"C:\Windows \SysWOW64\svchost.pif"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\NEO.cmd5⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\cmd.exe C:\\Users\\Public\\alpha.pif6⤵PID:3428
-
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\sc.exe C:\\Users\\Public\\Upha.pif6⤵PID:4712
-
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe C:\\Users\\Public\\aken.pif6⤵PID:4356
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\aken.pif -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath 'C:\'"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Public\aken.pifC:\\Users\\Public\\aken.pif -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath 'C:\'"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
-
-
-
-
-
C:\Users\Public\Libraries\jhaqozvD.pifC:\Users\Public\Libraries\jhaqozvD.pif2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1400
-
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:2536
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1368
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
13KB
MD5616f542f94791979d27798e12fe9374b
SHA1a1d2b9c37d76e14fc3e8424644012c32754e8338
SHA256d3c9ddaa8debfa28bfdff1dfc8c5ba4e11e39c7d9029ead83c874fcfc8325ddb
SHA512431c38a99970f6e808966c333a345776537fa85ee1c427b9a4d72333542b30461955e93527c1d7771444d738ded79116d84cc0623638182f2de8f4a07593a1cf
-
Filesize
18KB
MD5d202469089fa5ec9032f44408562f842
SHA1bb493815fa079fd19529c25fd0964bc0ae0af26e
SHA2569c330f29b95689d3ab2f7a461479cd87869464cc03e53b0d8ff5727baa8da979
SHA51235788359b8092be103fce441fdb3a306d6697f16d752dd1300b1be65cd774f20bc24fd633c276d91d231c0295e57ab7f36aa9ff340a81c0b105681bc7a906ad5
-
Filesize
28KB
MD5d9b276c49813262ba64f91b640235ba9
SHA1aec725ff0f08798f9fc4248db95461b96f75dd15
SHA25667bb0e1739291769728fe9e8a77f6e8f5cf506ccf617d55a3349b0a7542d49a5
SHA51295b3079a55ca05fd92b92985ade1ba955323752930766d6fb968e6981125dcac4b9a65f93dde17319980dd88c03540ceeb2faf66890d2e8f9358f25387058ee4
-
Filesize
66KB
MD5c116d3604ceafe7057d77ff27552c215
SHA1452b14432fb5758b46f2897aeccd89f7c82a727d
SHA2567bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
SHA5129202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6
-
Filesize
440KB
MD50e9ccd796e251916133392539572a374
SHA1eee0b7e9fdb295ea97c5f2e7c7ba3ac7f4085204
SHA256c7d4e119149a7150b7101a4bd9fffbf659fba76d058f7bf6cc73c99fb36e8221
SHA512e15c3696e2c96874242d3b0731ce0c790387ccce9a83a19634aed4d1efef72ce8b8fa683069950d652b16cd8d5e9daae9910df6d0a75cb74fdbe90ae5186765d
-
Filesize
324KB
MD5c5db7b712f280c3ae4f731ad7d5ea171
SHA1e8717ff0d40e01fd3b06de2aa5a401bed1c907cc
SHA256f6c9532e1f4b66be96f0f56bd7c3a3c1997ea8066b91bfcc984e41f072c347ba
SHA512bceaf7dc30f2c99b40b7025a5eb063f3131a1ef9349fdf356720eaef838bcf58ce3d5e3bad9459ddd2f872df430bdb66a766a5acff5d3bbc738eba8945cb0a89
-
Filesize
40KB
MD522bb5bd901d8b25ac5b41edbb7d5053e
SHA18a935dd8d7e104fc553ff7e8b54a404f7b079334
SHA2568dcaeeebef9b9f3d41d295db145ffb3850f309d089c08125c7fa7034db5fd80e
SHA512cc3fb68fd6791a08e4a7d1a8db8d07cfcc8c9b9dceec10b53f0cb7ee86473303a19be4f23e379f84c59e02d0568e7c066e21cd1300f6032dac4ba52f609f62e7
-
Filesize
111KB
MD5b124b37740d85c220735af1820b8dbaa
SHA1cb11862a0ed2cde7459402256d6efb73d709e6fd
SHA256da2b7b6cb51fff82cf18dc102e248ec90dde31c916cfa3c2b54563583c04d0c7
SHA5123beec303bfd6f9090d2a4868c109830db919926bcb5e2def5bdfe01b7260d59247db41ff7a1bbe5be8294def1efe6feda2591fe45e67a1ae5bd4b47bb1a24d3d
-
Filesize
94KB
MD5869640d0a3f838694ab4dfea9e2f544d
SHA1bdc42b280446ba53624ff23f314aadb861566832
SHA2560db4d3ffdb96d13cf3b427af8be66d985728c55ae254e4b67d287797e4c0b323
SHA5126e775cfb350415434b18427d5ff79b930ed3b0b3fc3466bc195a796c95661d4696f2d662dd0e020c3a6c3419c2734468b1d7546712ecec868d2bbfd2bc2468a7