Analysis

  • max time kernel
    14s
  • max time network
    116s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    19-01-2021 12:04

General

  • Target

    INV0009876.exe

  • Size

    666KB

  • MD5

    2f7ea13f989e231b54104840f0ca91ce

  • SHA1

    69e1a342cfaed1eaf5e3daa0427a3715be32c967

  • SHA256

    3bea531a02c14fe09f631ee0f957d12bbf07085c666ee0c5f05de926e88d40c8

  • SHA512

    8abee6f0b36140e1404279d8a3e71c8bce5e2168cdc2f128349e439e95860d5ccaf1905bc585d6a0fd51d050a56ebfb6819f9836ac6422281ed5dab6cd410fd3

Malware Config

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger Payload 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\INV0009876.exe
    "C:\Users\Admin\AppData\Local\Temp\INV0009876.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:788
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 660
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1720

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/788-14-0x0000000004990000-0x0000000004991000-memory.dmp
    Filesize

    4KB

  • memory/788-8-0x000000000046412E-mapping.dmp
  • memory/788-7-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/788-9-0x0000000075C31000-0x0000000075C33000-memory.dmp
    Filesize

    8KB

  • memory/788-10-0x0000000074EE0000-0x00000000755CE000-memory.dmp
    Filesize

    6.9MB

  • memory/788-11-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/1720-17-0x00000000007B0000-0x00000000007B1000-memory.dmp
    Filesize

    4KB

  • memory/1720-16-0x0000000001ED0000-0x0000000001EE1000-memory.dmp
    Filesize

    68KB

  • memory/1720-15-0x0000000000000000-mapping.dmp
  • memory/2028-6-0x0000000000530000-0x000000000053F000-memory.dmp
    Filesize

    60KB

  • memory/2028-13-0x0000000004D10000-0x0000000004D11000-memory.dmp
    Filesize

    4KB

  • memory/2028-2-0x0000000074EE0000-0x00000000755CE000-memory.dmp
    Filesize

    6.9MB

  • memory/2028-5-0x00000000007B0000-0x0000000000841000-memory.dmp
    Filesize

    580KB

  • memory/2028-3-0x00000000001B0000-0x00000000001B1000-memory.dmp
    Filesize

    4KB