Analysis

  • max time kernel
    20s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    18-01-2021 08:20

General

  • Target

    PO-09IOIOOUIR.exe

  • Size

    23KB

  • MD5

    b644ad55edc241dc9ee0b7bdb55c8704

  • SHA1

    d0f4162b77fd7e63fb175c061395beaa379e233d

  • SHA256

    be2ff52ed353429d954a579493e0d95571a1da3edbecd6328bf3ef76a47aeda0

  • SHA512

    3ff994c5d5442f2047cf31117e47e60d3d58e6a8663b6a2cacb64982f5deb8488c037470d2087e5b73c3f8253f5b193a9e621ad51756d2dd05034a75fbe141d9

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger Payload 7 IoCs
  • Drops startup file 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 7 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO-09IOIOOUIR.exe
    "C:\Users\Admin\AppData\Local\Temp\PO-09IOIOOUIR.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\PO-09IOIOOUIR.exe
      "C:\Users\Admin\AppData\Local\Temp\PO-09IOIOOUIR.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1240
    • C:\Users\Admin\AppData\Local\Temp\PO-09IOIOOUIR.exe
      "C:\Users\Admin\AppData\Local\Temp\PO-09IOIOOUIR.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:904
    • C:\Users\Admin\AppData\Local\Temp\PO-09IOIOOUIR.exe
      "C:\Users\Admin\AppData\Local\Temp\PO-09IOIOOUIR.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1536
    • C:\Users\Admin\AppData\Local\Temp\PO-09IOIOOUIR.exe
      "C:\Users\Admin\AppData\Local\Temp\PO-09IOIOOUIR.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:416
    • C:\Users\Admin\AppData\Local\Temp\PO-09IOIOOUIR.exe
      "C:\Users\Admin\AppData\Local\Temp\PO-09IOIOOUIR.exe"
      2⤵
        PID:324

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Winlogon Helper DLL

    1
    T1004

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Credential Access

    Credentials in Files

    3
    T1081

    Collection

    Data from Local System

    3
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/324-27-0x00000000004643BE-mapping.dmp
    • memory/416-18-0x00000000004643BE-mapping.dmp
    • memory/416-33-0x00000000049F0000-0x00000000049F1000-memory.dmp
      Filesize

      4KB

    • memory/416-20-0x0000000074D20000-0x000000007540E000-memory.dmp
      Filesize

      6.9MB

    • memory/904-31-0x0000000004A80000-0x0000000004A81000-memory.dmp
      Filesize

      4KB

    • memory/904-13-0x0000000074D20000-0x000000007540E000-memory.dmp
      Filesize

      6.9MB

    • memory/904-11-0x00000000004643BE-mapping.dmp
    • memory/1240-7-0x0000000000400000-0x000000000046A000-memory.dmp
      Filesize

      424KB

    • memory/1240-10-0x0000000074D20000-0x000000007540E000-memory.dmp
      Filesize

      6.9MB

    • memory/1240-15-0x0000000000400000-0x000000000046A000-memory.dmp
      Filesize

      424KB

    • memory/1240-8-0x00000000004643BE-mapping.dmp
    • memory/1240-30-0x0000000002050000-0x0000000002051000-memory.dmp
      Filesize

      4KB

    • memory/1536-14-0x00000000004643BE-mapping.dmp
    • memory/1536-16-0x0000000074D20000-0x000000007540E000-memory.dmp
      Filesize

      6.9MB

    • memory/1536-32-0x0000000004AF0000-0x0000000004AF1000-memory.dmp
      Filesize

      4KB

    • memory/1724-2-0x0000000074D20000-0x000000007540E000-memory.dmp
      Filesize

      6.9MB

    • memory/1724-21-0x00000000004E0000-0x00000000004E1000-memory.dmp
      Filesize

      4KB

    • memory/1724-6-0x0000000001E80000-0x0000000001F20000-memory.dmp
      Filesize

      640KB

    • memory/1724-5-0x0000000004B80000-0x0000000004B81000-memory.dmp
      Filesize

      4KB

    • memory/1724-3-0x00000000008E0000-0x00000000008E1000-memory.dmp
      Filesize

      4KB