Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2025, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
af19b4b47092af571740a087ad59f9106bd537bdf439fabaf8148d1a8d8c0c42.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
af19b4b47092af571740a087ad59f9106bd537bdf439fabaf8148d1a8d8c0c42.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Fetalisation.ps1
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Fetalisation.ps1
Resource
win10v2004-20250217-en
General
-
Target
af19b4b47092af571740a087ad59f9106bd537bdf439fabaf8148d1a8d8c0c42.exe
-
Size
501KB
-
MD5
ed390ba9dad731f45917d47a22fd8db7
-
SHA1
6e62363870711c4c6c6f23949af165504948293f
-
SHA256
af19b4b47092af571740a087ad59f9106bd537bdf439fabaf8148d1a8d8c0c42
-
SHA512
b3ce3d1ec15589c528c93008bd45906821b7ba28539ba3d80a7ddcfcc86b0ede92cb3e70dd398f2caabd28279a9e910b52aea6adb4562ead13bb8e50d4ec5eb8
-
SSDEEP
12288:VQeEJFJYJbJPeJyxJxWJiJfJcJWJSJaJ2J/JSJFJ8JjJcJHJQJoXJSJAhwjJTJZy:dEJFJYJbJPeJyxJxWJiJfJcJWJSJaJ2K
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
smtp.ionos.es - Port:
587 - Username:
[email protected] - Password:
s46S2&4+ - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Loads dropped DLL 1 IoCs
pid Process 4596 af19b4b47092af571740a087ad59f9106bd537bdf439fabaf8148d1a8d8c0c42.exe -
Blocklisted process makes network request 6 IoCs
flow pid Process 30 3060 msiexec.exe 32 3060 msiexec.exe 34 3060 msiexec.exe 36 3060 msiexec.exe 40 3060 msiexec.exe 43 3060 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 30 drive.google.com 29 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 42 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3060 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1896 powershell.exe 3060 msiexec.exe -
pid Process 1896 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2236 3060 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af19b4b47092af571740a087ad59f9106bd537bdf439fabaf8148d1a8d8c0c42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1896 powershell.exe 1896 powershell.exe 1896 powershell.exe 1896 powershell.exe 1896 powershell.exe 1896 powershell.exe 1896 powershell.exe 1896 powershell.exe 1896 powershell.exe 3060 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1896 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1896 powershell.exe Token: SeIncreaseQuotaPrivilege 1896 powershell.exe Token: SeSecurityPrivilege 1896 powershell.exe Token: SeTakeOwnershipPrivilege 1896 powershell.exe Token: SeLoadDriverPrivilege 1896 powershell.exe Token: SeSystemProfilePrivilege 1896 powershell.exe Token: SeSystemtimePrivilege 1896 powershell.exe Token: SeProfSingleProcessPrivilege 1896 powershell.exe Token: SeIncBasePriorityPrivilege 1896 powershell.exe Token: SeCreatePagefilePrivilege 1896 powershell.exe Token: SeBackupPrivilege 1896 powershell.exe Token: SeRestorePrivilege 1896 powershell.exe Token: SeShutdownPrivilege 1896 powershell.exe Token: SeDebugPrivilege 1896 powershell.exe Token: SeSystemEnvironmentPrivilege 1896 powershell.exe Token: SeRemoteShutdownPrivilege 1896 powershell.exe Token: SeUndockPrivilege 1896 powershell.exe Token: SeManageVolumePrivilege 1896 powershell.exe Token: 33 1896 powershell.exe Token: 34 1896 powershell.exe Token: 35 1896 powershell.exe Token: 36 1896 powershell.exe Token: SeDebugPrivilege 3060 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4596 wrote to memory of 1896 4596 af19b4b47092af571740a087ad59f9106bd537bdf439fabaf8148d1a8d8c0c42.exe 88 PID 4596 wrote to memory of 1896 4596 af19b4b47092af571740a087ad59f9106bd537bdf439fabaf8148d1a8d8c0c42.exe 88 PID 4596 wrote to memory of 1896 4596 af19b4b47092af571740a087ad59f9106bd537bdf439fabaf8148d1a8d8c0c42.exe 88 PID 1896 wrote to memory of 3060 1896 powershell.exe 97 PID 1896 wrote to memory of 3060 1896 powershell.exe 97 PID 1896 wrote to memory of 3060 1896 powershell.exe 97 PID 1896 wrote to memory of 3060 1896 powershell.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\af19b4b47092af571740a087ad59f9106bd537bdf439fabaf8148d1a8d8c0c42.exe"C:\Users\Admin\AppData\Local\Temp\af19b4b47092af571740a087ad59f9106bd537bdf439fabaf8148d1a8d8c0c42.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle minimized "$Altsax=gc -Raw 'C:\Users\Admin\AppData\Roaming\Kalkvrksarbejderen84\chego\reverensens\Fetalisation.Skm';$Brandsikring141=$Altsax.SubString(54350,3);.$Brandsikring141($Altsax)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 23964⤵
- Program crash
PID:2236
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3060 -ip 30601⤵PID:1108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD551e63a9c5d6d230ef1c421b2eccd45dc
SHA1c499cdad5c613d71ed3f7e93360f1bbc5748c45d
SHA256cd8496a3802378391ec425dec424a14f5d30e242f192ec4eb022d767f9a2480f
SHA512c23d713c3c834b3397c2a199490aed28f28d21f5781205c24df5e1e32365985c8a55be58f06979df09222740ffa51f4da764ebc3d912cd0c9d56ab6a33cab522
-
Filesize
341KB
MD58138572b05ccf71b96a2146fa215f714
SHA19e49c8a17ea4b24a5cde92cf8ec8da27b8810bc9
SHA2561726c527b8fea7e5b6f3c63ad70b49958aec8f19416bf30f9dd6146f7571d871
SHA512600c97891c5d92153fc3bc24d88a0c127e91621675c3525c24367bb9505224f414f36ffe89f9b01c5e802fb3ccde4b49458f455eae6635669238b8a7df6e08fa
-
Filesize
53KB
MD5871a6d5157172d55968ef12e17801876
SHA1ab84cf4eb5b06098f6349c6da15d2bfb02ab2c73
SHA25637670c06c97e741fd4842a26ce3c9fdc1d715e848b1dc57376c5d7a4851c52bc
SHA5124c4a176fe4364ab03bfb35595ef2bfe3eeaaff93044662770fb51740a7be6d162a5db2b48af2d0ff8b75f0a3564871be32d27cd96a667d4dd4a0a7ab47b1eaef