Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
rPedidodeCota____o-20250325_pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rPedidodeCota____o-20250325_pdf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Burrawang.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Burrawang.ps1
Resource
win10v2004-20250314-en
General
-
Target
rPedidodeCota____o-20250325_pdf.exe
-
Size
691KB
-
MD5
8f54f3992cc7a3da06c8a617b5816419
-
SHA1
a9e4a75e65b80860b3267a9883001617ca836d95
-
SHA256
1f20d50f886138f94232c9b6b848163f5ed7edf4ed473c1507411b06b840debf
-
SHA512
543aeceb7732758d063371538f9ef549b8542e7c586693c67b81840b57700f1500f359782d6c07ebb5222182c9c0d728ff39474e240fe0133851835c36c5b609
-
SSDEEP
12288:mk+LIW771Zv4Wivvf+Nlv7c6YWRdxk4JzpnAwTIEUvKkwvqGMeys1c:SLjbv4WivvWNlvoMdm4JFAlMPmac
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.projecttime.pt - Port:
587 - Username:
[email protected] - Password:
prosup2013 - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 7 IoCs
flow pid Process 28 1568 msiexec.exe 31 1568 msiexec.exe 33 1568 msiexec.exe 35 1568 msiexec.exe 40 1568 msiexec.exe 42 1568 msiexec.exe 46 1568 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 27 drive.google.com 28 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 39 checkip.dyndns.org 41 reallyfreegeoip.org 42 reallyfreegeoip.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1568 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4200 powershell.exe 1568 msiexec.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\Urliges176.ane rPedidodeCota____o-20250325_pdf.exe -
pid Process 4200 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rPedidodeCota____o-20250325_pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4200 powershell.exe 4200 powershell.exe 4200 powershell.exe 4200 powershell.exe 4200 powershell.exe 4200 powershell.exe 4200 powershell.exe 4200 powershell.exe 4200 powershell.exe 1568 msiexec.exe 1568 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4200 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4200 powershell.exe Token: SeIncreaseQuotaPrivilege 4200 powershell.exe Token: SeSecurityPrivilege 4200 powershell.exe Token: SeTakeOwnershipPrivilege 4200 powershell.exe Token: SeLoadDriverPrivilege 4200 powershell.exe Token: SeSystemProfilePrivilege 4200 powershell.exe Token: SeSystemtimePrivilege 4200 powershell.exe Token: SeProfSingleProcessPrivilege 4200 powershell.exe Token: SeIncBasePriorityPrivilege 4200 powershell.exe Token: SeCreatePagefilePrivilege 4200 powershell.exe Token: SeBackupPrivilege 4200 powershell.exe Token: SeRestorePrivilege 4200 powershell.exe Token: SeShutdownPrivilege 4200 powershell.exe Token: SeDebugPrivilege 4200 powershell.exe Token: SeSystemEnvironmentPrivilege 4200 powershell.exe Token: SeRemoteShutdownPrivilege 4200 powershell.exe Token: SeUndockPrivilege 4200 powershell.exe Token: SeManageVolumePrivilege 4200 powershell.exe Token: 33 4200 powershell.exe Token: 34 4200 powershell.exe Token: 35 4200 powershell.exe Token: 36 4200 powershell.exe Token: SeDebugPrivilege 1568 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4928 wrote to memory of 4200 4928 rPedidodeCota____o-20250325_pdf.exe 88 PID 4928 wrote to memory of 4200 4928 rPedidodeCota____o-20250325_pdf.exe 88 PID 4928 wrote to memory of 4200 4928 rPedidodeCota____o-20250325_pdf.exe 88 PID 4200 wrote to memory of 1568 4200 powershell.exe 97 PID 4200 wrote to memory of 1568 4200 powershell.exe 97 PID 4200 wrote to memory of 1568 4200 powershell.exe 97 PID 4200 wrote to memory of 1568 4200 powershell.exe 97 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rPedidodeCota____o-20250325_pdf.exe"C:\Users\Admin\AppData\Local\Temp\rPedidodeCota____o-20250325_pdf.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle 1 "$Tempersome=GC -raw 'C:\Users\Admin\AppData\Local\tilkendelsens\disappearances\josts\Burrawang.Euo';$lyssignalernes=$Tempersome.SubString(52101,3);.$lyssignalernes($Tempersome)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
50KB
MD56d32d99c206a81fcfc06d7ed6225282d
SHA1f3740ea1acaa8452aa34a4dda3c1a6865881845c
SHA256d8602baba5af6700d20d5e2048fd527b3d84e4c5c78abb1b95f9abb20fee2c94
SHA512f430ed98550e4fdf4bd1905251ab0f81374c88b29d245a6c5fba7c1e9fd58d01b93467efd2e7813e7b37e76affdb985a24bdae715eb07f9215d77fd77253f22b
-
Filesize
383KB
MD528e841c296b14df1d4eac680d6ca5e86
SHA10ad5b0fd514d977a0dad519bf38ff98603b705c9
SHA256ed617242cb4f184927df7ff1995b877fb7bb51d8e931ab10b5c753c1bd2fc087
SHA5125be6de26d3ac141b7cab0eb187b70aee1a18f3f2da89a654e2edc9f9e009b542abe5e4501c10940ea8b9c182bc85344dfd2206320628307685fda217033646b4