Analysis

  • max time kernel
    107s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    19-01-2021 12:04

General

  • Target

    INV0009876.exe

  • Size

    666KB

  • MD5

    2f7ea13f989e231b54104840f0ca91ce

  • SHA1

    69e1a342cfaed1eaf5e3daa0427a3715be32c967

  • SHA256

    3bea531a02c14fe09f631ee0f957d12bbf07085c666ee0c5f05de926e88d40c8

  • SHA512

    8abee6f0b36140e1404279d8a3e71c8bce5e2168cdc2f128349e439e95860d5ccaf1905bc585d6a0fd51d050a56ebfb6819f9836ac6422281ed5dab6cd410fd3

Malware Config

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger Payload 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\INV0009876.exe
    "C:\Users\Admin\AppData\Local\Temp\INV0009876.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:496
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2664
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 496 -s 1176
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3100

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/496-11-0x0000000005840000-0x0000000005841000-memory.dmp
    Filesize

    4KB

  • memory/496-9-0x00000000057A0000-0x00000000057A1000-memory.dmp
    Filesize

    4KB

  • memory/496-5-0x0000000005A20000-0x0000000005A21000-memory.dmp
    Filesize

    4KB

  • memory/496-6-0x00000000055C0000-0x00000000055C1000-memory.dmp
    Filesize

    4KB

  • memory/496-2-0x0000000073360000-0x0000000073A4E000-memory.dmp
    Filesize

    6.9MB

  • memory/496-8-0x0000000005F20000-0x0000000005F21000-memory.dmp
    Filesize

    4KB

  • memory/496-3-0x0000000000C70000-0x0000000000C71000-memory.dmp
    Filesize

    4KB

  • memory/496-10-0x00000000055A0000-0x00000000055AF000-memory.dmp
    Filesize

    60KB

  • memory/496-7-0x0000000005660000-0x00000000056F1000-memory.dmp
    Filesize

    580KB

  • memory/496-19-0x0000000005790000-0x0000000005791000-memory.dmp
    Filesize

    4KB

  • memory/2664-13-0x000000000046412E-mapping.dmp
  • memory/2664-14-0x0000000073360000-0x0000000073A4E000-memory.dmp
    Filesize

    6.9MB

  • memory/2664-12-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/2664-20-0x0000000005380000-0x0000000005381000-memory.dmp
    Filesize

    4KB

  • memory/2664-22-0x0000000006230000-0x0000000006231000-memory.dmp
    Filesize

    4KB

  • memory/3100-21-0x0000000004A60000-0x0000000004A61000-memory.dmp
    Filesize

    4KB