Analysis
-
max time kernel
127s -
max time network
128s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-01-2021 16:26
Static task
static1
Behavioral task
behavioral1
Sample
000909000000000000.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
000909000000000000.exe
Resource
win10v20201028
General
-
Target
000909000000000000.exe
-
Size
587KB
-
MD5
db728ca63b516164bff44c2374a24c81
-
SHA1
3d602e1ee511c52dc56c47e9f9430d73384751cf
-
SHA256
7976634e38ef319a5d9cab0aa72ed0d8a4ec71ea6449b2f6ee41565828d2f3ca
-
SHA512
850b13d709460be7d5bd00d725bbad3d6cef0191fb74d74130194aa8d997440a5ea2d8c16a43f25d306a6876ef2c98197e41258be5784d4eb94cce8d6519c539
Malware Config
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3464-23-0x00000000004643BE-mapping.dmp family_snakekeylogger behavioral2/memory/3464-21-0x0000000000400000-0x000000000046A000-memory.dmp family_snakekeylogger -
Drops startup file 2 IoCs
Processes:
Powershell.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe Powershell.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 checkip.dyndns.org 12 freegeoip.app 13 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
000909000000000000.exedescription pid process target process PID 4780 set thread context of 3464 4780 000909000000000000.exe InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Powershell.exeInstallUtil.exepid process 4208 Powershell.exe 4208 Powershell.exe 3464 InstallUtil.exe 4208 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Powershell.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 4208 Powershell.exe Token: SeDebugPrivilege 3464 InstallUtil.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
000909000000000000.exedescription pid process target process PID 4780 wrote to memory of 4208 4780 000909000000000000.exe Powershell.exe PID 4780 wrote to memory of 4208 4780 000909000000000000.exe Powershell.exe PID 4780 wrote to memory of 4208 4780 000909000000000000.exe Powershell.exe PID 4780 wrote to memory of 3464 4780 000909000000000000.exe InstallUtil.exe PID 4780 wrote to memory of 3464 4780 000909000000000000.exe InstallUtil.exe PID 4780 wrote to memory of 3464 4780 000909000000000000.exe InstallUtil.exe PID 4780 wrote to memory of 3464 4780 000909000000000000.exe InstallUtil.exe PID 4780 wrote to memory of 3464 4780 000909000000000000.exe InstallUtil.exe PID 4780 wrote to memory of 3464 4780 000909000000000000.exe InstallUtil.exe PID 4780 wrote to memory of 3464 4780 000909000000000000.exe InstallUtil.exe PID 4780 wrote to memory of 3464 4780 000909000000000000.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\000909000000000000.exe"C:\Users\Admin\AppData\Local\Temp\000909000000000000.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\000909000000000000.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe'2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3464-23-0x00000000004643BE-mapping.dmp
-
memory/3464-34-0x00000000063B0000-0x00000000063B1000-memory.dmpFilesize
4KB
-
memory/3464-33-0x0000000006610000-0x0000000006611000-memory.dmpFilesize
4KB
-
memory/3464-32-0x0000000006440000-0x0000000006441000-memory.dmpFilesize
4KB
-
memory/3464-31-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3464-21-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/3464-25-0x0000000073360000-0x0000000073A4E000-memory.dmpFilesize
6.9MB
-
memory/4208-10-0x0000000000000000-mapping.dmp
-
memory/4208-18-0x0000000006C00000-0x0000000006C01000-memory.dmpFilesize
4KB
-
memory/4208-12-0x0000000006A50000-0x0000000006A51000-memory.dmpFilesize
4KB
-
memory/4208-13-0x0000000007240000-0x0000000007241000-memory.dmpFilesize
4KB
-
memory/4208-14-0x0000000006BD0000-0x0000000006BD1000-memory.dmpFilesize
4KB
-
memory/4208-15-0x0000000006F00000-0x0000000006F01000-memory.dmpFilesize
4KB
-
memory/4208-16-0x0000000006F70000-0x0000000006F71000-memory.dmpFilesize
4KB
-
memory/4208-35-0x0000000008C40000-0x0000000008C41000-memory.dmpFilesize
4KB
-
memory/4208-19-0x0000000006C02000-0x0000000006C03000-memory.dmpFilesize
4KB
-
memory/4208-39-0x0000000006C03000-0x0000000006C04000-memory.dmpFilesize
4KB
-
memory/4208-22-0x0000000006E90000-0x0000000006E91000-memory.dmpFilesize
4KB
-
memory/4208-11-0x0000000073360000-0x0000000073A4E000-memory.dmpFilesize
6.9MB
-
memory/4208-37-0x0000000008950000-0x0000000008951000-memory.dmpFilesize
4KB
-
memory/4208-24-0x0000000006EB0000-0x0000000006EB1000-memory.dmpFilesize
4KB
-
memory/4208-36-0x00000000088E0000-0x00000000088E1000-memory.dmpFilesize
4KB
-
memory/4208-30-0x0000000007C40000-0x0000000007C41000-memory.dmpFilesize
4KB
-
memory/4780-2-0x0000000073360000-0x0000000073A4E000-memory.dmpFilesize
6.9MB
-
memory/4780-6-0x0000000004C60000-0x0000000004C61000-memory.dmpFilesize
4KB
-
memory/4780-5-0x0000000004BC0000-0x0000000004C51000-memory.dmpFilesize
580KB
-
memory/4780-3-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/4780-7-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/4780-8-0x0000000005630000-0x0000000005631000-memory.dmpFilesize
4KB
-
memory/4780-9-0x0000000004BB0000-0x0000000004BB1000-memory.dmpFilesize
4KB
-
memory/4780-20-0x0000000005060000-0x000000000506F000-memory.dmpFilesize
60KB