Analysis

  • max time kernel
    80s
  • max time network
    83s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24/02/2025, 18:05

General

  • Target

    payment.rar

  • Size

    417KB

  • MD5

    c0aba3e9e8641c901b98799bbbf3adff

  • SHA1

    785a722cad8c1711a843d312467c9bbcaf44df7e

  • SHA256

    934801a22972a860d0f209cb42a91b6f4dc6ae8ea60b1f6a5ae959b0c5dd4a94

  • SHA512

    fcbcfd4758e03b1ba3a8c91fd428d608ea8bd99d448d2e362ac0a86bdc91f117d26658f3cd8b4fb208cde75abca552dfc0cd9fd0b8e1e418892dac71dd40802e

  • SSDEEP

    12288:kZlnNx5CubImnelo81PRDaPSATAvU3z0fDjirgN:Wc+Ij1PhaPSnvUjMp

Malware Config

Extracted

Family

vipkeylogger

Credentials

Signatures

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Vipkeylogger family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Blocklisted process makes network request 14 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\payment.rar"
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1836
    • C:\Users\Admin\AppData\Local\Temp\7zOC27D6787\Invoice Pending Payment.exe
      "C:\Users\Admin\AppData\Local\Temp\7zOC27D6787\Invoice Pending Payment.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1088
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" -windowstyle minimized "$Bibrd=gc -Raw 'C:\Users\Admin\AppData\Roaming\Kalkvrksarbejderen84\chego\reverensens\Defmrkede\Crossbeam.Dec122';$Antiodont=$Bibrd.SubString(60335,3);.$Antiodont($Bibrd)"
        3⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5100
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\SysWOW64\msiexec.exe"
          4⤵
          • Accesses Microsoft Outlook profiles
          • Blocklisted process makes network request
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2484
  • C:\Users\Admin\Desktop\Invoice Pending Payment.exe
    "C:\Users\Admin\Desktop\Invoice Pending Payment.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3364
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle minimized "$Bibrd=gc -Raw 'C:\Users\Admin\AppData\Roaming\Kalkvrksarbejderen84\chego\reverensens\Defmrkede\Crossbeam.Dec122';$Antiodont=$Bibrd.SubString(60335,3);.$Antiodont($Bibrd)"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\SysWOW64\msiexec.exe"
        3⤵
        • Accesses Microsoft Outlook profiles
        • Blocklisted process makes network request
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    854B

    MD5

    e935bc5762068caf3e24a2683b1b8a88

    SHA1

    82b70eb774c0756837fe8d7acbfeec05ecbf5463

    SHA256

    a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

    SHA512

    bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    4226da851e83c58755a2eb2eeaedc9d6

    SHA1

    d2e8ce3b48bc1430172c7522d6625e17b682f0dd

    SHA256

    e76264e537db15fcefd3558d4f3bfac96cea3d07ff976c977996df3b954c548e

    SHA512

    7a046574c53ae787f5ed004d3e15dd34450a82584799165d8826f164083a6ca06b299d4a7bf8605ba34315e944da48e4d49bd9e55eeeb355bbfb2a7eae78fed3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_2BB941531B2B417CB9B9143D82A69960

    Filesize

    472B

    MD5

    63804364511c8d2c841d4ebd7495d644

    SHA1

    6d9b1ac91eb1a79676d998f6d887788971725983

    SHA256

    ce41a54dad28d58b961669b5e8166522cb5ec7eb38017c336a4ca5642ebc402c

    SHA512

    cc2d90d60f30112ba45c016bda2dac4e1d74d0264ec04e3e0fdff7c1bedbd011e893e64a0a88fbc230aeeb5411220b90f7f0abca0502c197049e8028d6a0b53e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_38F145A9CE8D9293C83928EB300E3F1F

    Filesize

    472B

    MD5

    e9a53c10c3e30b8344548a3beb86acee

    SHA1

    bc6ecbe2151de401ac2de77a82aba693cae432c8

    SHA256

    026d35bfaf96bddb71efbc0be774aa1388b9a278eb38a7ebbcc41111365f35d6

    SHA512

    4baceff8dd3520d07f803ac61a8afd02d659827253d868e188cf02d92be900285865cd0fed4278e19cc87a69e2431ef578f11171c78493f536fd0487a77c2f40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    170B

    MD5

    1907d55ed5d1f2abe6e784f660e8179e

    SHA1

    cf3cba3f1f0f0941d4ac2ca32e8a60f75c29d36a

    SHA256

    afe59544e69f120df6f722383f206da391f1bd43105f282d4d5070c7d377ed03

    SHA512

    aef96f18b730c14a7dc3830135834a57044609a92770e08617ff6b2cd2425cb9979af5f3ce71844273570083ae54efa846c44a5ddf6019a96b45f510989965a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    1a3f72b5fafcbd5dfb5888e82a29da55

    SHA1

    a873bccf90050754d160242b61ab5577e941d2c6

    SHA256

    2ca18945690ee70ac61c9c05a81152ec963c4fa478e9eb5b216733662ef8c993

    SHA512

    dafeef918e5dcf9deaf1fb2073ee9d909cb56957e84f55734bd41f0ad0e519d9f95a32d6a1194e48644b500d5c240a78697afaefd2225519b07e2d9e51123005

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_2BB941531B2B417CB9B9143D82A69960

    Filesize

    402B

    MD5

    a561a59b07dafb264acf2b9a9d2d388d

    SHA1

    a2ec8ecdcb302243a1540290f741bd15b88554fb

    SHA256

    7186e2a55dfc422da8343fe7f0801bd972567b4aba7638c4c796eb11672c3854

    SHA512

    90c6b34813faf23c06de1f837f7742b0f70c0489acbe9bc49e93728f07adae199a2b659258a42e530498238fecde25156489641cea9d9ef90316552dcef2b060

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_38F145A9CE8D9293C83928EB300E3F1F

    Filesize

    410B

    MD5

    a13b0cb46230d6398027a09e60cbf29a

    SHA1

    1bb1b2e9bc11ace560a1c978728cae6e8acb0305

    SHA256

    f9d5188341da6184904bc8cb55413f2cc5f36a2ffa85eb3ca8e34d35f7f60c0a

    SHA512

    c9c7b4d6d533be3d91034159558d844371f3e4b58e1a71438dc55df693f2f0ee79e60ab5868043b57008c96f745b341aad794728b67c5282468084c00a401031

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

    Filesize

    60KB

    MD5

    535b473ec3e9c0fd5aad89062d7f20e8

    SHA1

    c900f90b3003452b975185c27bfb44c8f0b552c4

    SHA256

    f6bb190101537e41901392fb690045c5bf1cddaa954630e57c5d0b3410b2d6b0

    SHA512

    33f286b06e9198ca8ae5225c7796f0f176282e2386fa93a2450e1a65cdb235932ef8a0a778f6b16945f1496a5e12e3ba6e3905f02a47a9cbb92e14448f463c86

  • C:\Users\Admin\AppData\Local\Temp\7zOC27D6787\Invoice Pending Payment.exe

    Filesize

    495KB

    MD5

    e70e71a31781b44f850a39693784ce74

    SHA1

    ce8cf2dc1b30d5d6870cc3d374c15e1005fdc879

    SHA256

    a02b56b4c74424b72ae21d4737e822653e68b9762e1aeb313d81bd45abce39e7

    SHA512

    2a7994cec6638f7ff523358e7df0bfddad0f2abaef89e598455e9f0b7a44009e139ac9f9afd7ac38377ed302727c5c75322327b8fabf0b450835cdbb5c52a9a8

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_22iipdmf.qwd.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\nsqC787.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    51e63a9c5d6d230ef1c421b2eccd45dc

    SHA1

    c499cdad5c613d71ed3f7e93360f1bbc5748c45d

    SHA256

    cd8496a3802378391ec425dec424a14f5d30e242f192ec4eb022d767f9a2480f

    SHA512

    c23d713c3c834b3397c2a199490aed28f28d21f5781205c24df5e1e32365985c8a55be58f06979df09222740ffa51f4da764ebc3d912cd0c9d56ab6a33cab522

  • C:\Users\Admin\AppData\Roaming\Kalkvrksarbejderen84\chego\reverensens\Defmrkede\Crossbeam.Dec122

    Filesize

    58KB

    MD5

    798e71f2fb7aeccbf532d4b9c7484b56

    SHA1

    d22784524ac6412395f51a3fd3fe0cfba04f034c

    SHA256

    1669d04c0289873aa79409ac3522a90ce116740f52c11eb8833aaf5c8908acb8

    SHA512

    29f868a51ac1b4c25a4a7d1fad093e6fccc3adc762f8fa791c8e728aaf16a26ce0e43cdf45f955d0152d94ccff514776426bfb9a088cebf77ef9521a642606bf

  • C:\Users\Admin\AppData\Roaming\Kalkvrksarbejderen84\chego\reverensens\Defmrkede\Yderredens102.Kan

    Filesize

    330KB

    MD5

    a4dd91d5acfa3d8154510a16a27792df

    SHA1

    7f797beecc8609a7b617a7ccd6ba8a335d475a47

    SHA256

    5ae90ee62220502c1041b177854398c94b9f42f6115ce6fca120b7c0702c0286

    SHA512

    8f119081cf9625f036ac4783a7d127d25e8bf82bc6febe804edac2d18b71b9e85ab2c26cb04aa1a28a47cc1d49bd0676d486fea917ca872b7c2e43a6af889c07

  • memory/1500-103-0x00000000059E0000-0x0000000005D37000-memory.dmp

    Filesize

    3.3MB

  • memory/1500-112-0x0000000005FB0000-0x0000000005FFC000-memory.dmp

    Filesize

    304KB

  • memory/2484-115-0x0000000022610000-0x00000000226A2000-memory.dmp

    Filesize

    584KB

  • memory/2484-116-0x00000000225C0000-0x00000000225CA000-memory.dmp

    Filesize

    40KB

  • memory/2484-92-0x00000000224E0000-0x0000000022530000-memory.dmp

    Filesize

    320KB

  • memory/2484-91-0x0000000022C60000-0x0000000022E22000-memory.dmp

    Filesize

    1.8MB

  • memory/2484-89-0x0000000022010000-0x00000000220AC000-memory.dmp

    Filesize

    624KB

  • memory/2484-88-0x0000000001000000-0x0000000001048000-memory.dmp

    Filesize

    288KB

  • memory/2484-87-0x0000000001000000-0x0000000002317000-memory.dmp

    Filesize

    19.1MB

  • memory/2484-72-0x0000000001000000-0x0000000002317000-memory.dmp

    Filesize

    19.1MB

  • memory/2928-129-0x0000000000AC0000-0x0000000000B08000-memory.dmp

    Filesize

    288KB

  • memory/2928-128-0x0000000000AC0000-0x0000000001DD7000-memory.dmp

    Filesize

    19.1MB

  • memory/5100-42-0x0000000005FB0000-0x0000000005FD2000-memory.dmp

    Filesize

    136KB

  • memory/5100-64-0x00000000078E0000-0x000000000790A000-memory.dmp

    Filesize

    168KB

  • memory/5100-65-0x0000000007910000-0x0000000007934000-memory.dmp

    Filesize

    144KB

  • memory/5100-63-0x00000000078C0000-0x00000000078C8000-memory.dmp

    Filesize

    32KB

  • memory/5100-68-0x0000000008340000-0x000000000A072000-memory.dmp

    Filesize

    29.2MB

  • memory/5100-62-0x0000000007790000-0x00000000077AA000-memory.dmp

    Filesize

    104KB

  • memory/5100-61-0x0000000007050000-0x0000000007065000-memory.dmp

    Filesize

    84KB

  • memory/5100-60-0x0000000007000000-0x000000000700E000-memory.dmp

    Filesize

    56KB

  • memory/5100-59-0x0000000007020000-0x0000000007031000-memory.dmp

    Filesize

    68KB

  • memory/5100-58-0x0000000006FD0000-0x0000000006FDA000-memory.dmp

    Filesize

    40KB

  • memory/5100-46-0x0000000006C60000-0x0000000006C94000-memory.dmp

    Filesize

    208KB

  • memory/5100-47-0x0000000070780000-0x00000000707CC000-memory.dmp

    Filesize

    304KB

  • memory/5100-56-0x0000000006CA0000-0x0000000006CBE000-memory.dmp

    Filesize

    120KB

  • memory/5100-57-0x0000000006ED0000-0x0000000006F74000-memory.dmp

    Filesize

    656KB

  • memory/5100-45-0x0000000007CC0000-0x000000000833A000-memory.dmp

    Filesize

    6.5MB

  • memory/5100-43-0x0000000007090000-0x0000000007636000-memory.dmp

    Filesize

    5.6MB

  • memory/5100-41-0x0000000005F40000-0x0000000005F5A000-memory.dmp

    Filesize

    104KB

  • memory/5100-40-0x00000000069E0000-0x0000000006A76000-memory.dmp

    Filesize

    600KB

  • memory/5100-39-0x0000000005AD0000-0x0000000005B1C000-memory.dmp

    Filesize

    304KB

  • memory/5100-38-0x0000000005A20000-0x0000000005A3E000-memory.dmp

    Filesize

    120KB

  • memory/5100-37-0x00000000055D0000-0x0000000005927000-memory.dmp

    Filesize

    3.3MB

  • memory/5100-28-0x0000000005420000-0x0000000005486000-memory.dmp

    Filesize

    408KB

  • memory/5100-27-0x0000000005340000-0x00000000053A6000-memory.dmp

    Filesize

    408KB

  • memory/5100-26-0x00000000052A0000-0x00000000052C2000-memory.dmp

    Filesize

    136KB

  • memory/5100-25-0x0000000004C30000-0x000000000525A000-memory.dmp

    Filesize

    6.2MB

  • memory/5100-24-0x00000000045C0000-0x00000000045F6000-memory.dmp

    Filesize

    216KB