Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 16:20
Static task
static1
Behavioral task
behavioral1
Sample
STATEMENT OF ACCOUNT-.pdf.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
STATEMENT OF ACCOUNT-.pdf.exe
Resource
win10v20201028
General
-
Target
STATEMENT OF ACCOUNT-.pdf.exe
-
Size
958KB
-
MD5
36af1327aa572a073ee6a1cee0cb1255
-
SHA1
e9a967394c2b2a51ebfd2f4285173377ea989694
-
SHA256
2fabd4762d0f346547c11817e614da7462b64344ba29eef8bd58472bf524902c
-
SHA512
55ad4501e4491147e776c40f1c436c4705ca8b0a3912ab218f6a5f2c842733961913e992e2af3a51b018325bd95dbb639442f1eac7d81b1313508c0ba4c0679a
Malware Config
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1892-16-0x00000000004643AE-mapping.dmp family_snakekeylogger behavioral1/memory/1892-15-0x0000000000400000-0x000000000046A000-memory.dmp family_snakekeylogger behavioral1/memory/1892-19-0x0000000000400000-0x000000000046A000-memory.dmp family_snakekeylogger -
Drops startup file 2 IoCs
Processes:
Powershell.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe Powershell.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 checkip.dyndns.org 11 freegeoip.app 12 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
STATEMENT OF ACCOUNT-.pdf.exedescription pid process target process PID 1368 set thread context of 1892 1368 STATEMENT OF ACCOUNT-.pdf.exe InstallUtil.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1668 1368 WerFault.exe STATEMENT OF ACCOUNT-.pdf.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
Powershell.exeInstallUtil.exeWerFault.exepid process 1316 Powershell.exe 1892 InstallUtil.exe 1316 Powershell.exe 1668 WerFault.exe 1668 WerFault.exe 1668 WerFault.exe 1668 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Powershell.exeInstallUtil.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1316 Powershell.exe Token: SeDebugPrivilege 1892 InstallUtil.exe Token: SeDebugPrivilege 1668 WerFault.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
STATEMENT OF ACCOUNT-.pdf.exedescription pid process target process PID 1368 wrote to memory of 1316 1368 STATEMENT OF ACCOUNT-.pdf.exe Powershell.exe PID 1368 wrote to memory of 1316 1368 STATEMENT OF ACCOUNT-.pdf.exe Powershell.exe PID 1368 wrote to memory of 1316 1368 STATEMENT OF ACCOUNT-.pdf.exe Powershell.exe PID 1368 wrote to memory of 1316 1368 STATEMENT OF ACCOUNT-.pdf.exe Powershell.exe PID 1368 wrote to memory of 1892 1368 STATEMENT OF ACCOUNT-.pdf.exe InstallUtil.exe PID 1368 wrote to memory of 1892 1368 STATEMENT OF ACCOUNT-.pdf.exe InstallUtil.exe PID 1368 wrote to memory of 1892 1368 STATEMENT OF ACCOUNT-.pdf.exe InstallUtil.exe PID 1368 wrote to memory of 1892 1368 STATEMENT OF ACCOUNT-.pdf.exe InstallUtil.exe PID 1368 wrote to memory of 1892 1368 STATEMENT OF ACCOUNT-.pdf.exe InstallUtil.exe PID 1368 wrote to memory of 1892 1368 STATEMENT OF ACCOUNT-.pdf.exe InstallUtil.exe PID 1368 wrote to memory of 1892 1368 STATEMENT OF ACCOUNT-.pdf.exe InstallUtil.exe PID 1368 wrote to memory of 1892 1368 STATEMENT OF ACCOUNT-.pdf.exe InstallUtil.exe PID 1368 wrote to memory of 1892 1368 STATEMENT OF ACCOUNT-.pdf.exe InstallUtil.exe PID 1368 wrote to memory of 1892 1368 STATEMENT OF ACCOUNT-.pdf.exe InstallUtil.exe PID 1368 wrote to memory of 1892 1368 STATEMENT OF ACCOUNT-.pdf.exe InstallUtil.exe PID 1368 wrote to memory of 1892 1368 STATEMENT OF ACCOUNT-.pdf.exe InstallUtil.exe PID 1368 wrote to memory of 1668 1368 STATEMENT OF ACCOUNT-.pdf.exe WerFault.exe PID 1368 wrote to memory of 1668 1368 STATEMENT OF ACCOUNT-.pdf.exe WerFault.exe PID 1368 wrote to memory of 1668 1368 STATEMENT OF ACCOUNT-.pdf.exe WerFault.exe PID 1368 wrote to memory of 1668 1368 STATEMENT OF ACCOUNT-.pdf.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT-.pdf.exe"C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT-.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT-.pdf.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe'2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 6682⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1316-12-0x0000000004840000-0x0000000004841000-memory.dmpFilesize
4KB
-
memory/1316-10-0x0000000004880000-0x0000000004881000-memory.dmpFilesize
4KB
-
memory/1316-38-0x0000000006290000-0x0000000006291000-memory.dmpFilesize
4KB
-
memory/1316-6-0x0000000000000000-mapping.dmp
-
memory/1316-7-0x0000000075571000-0x0000000075573000-memory.dmpFilesize
8KB
-
memory/1316-8-0x0000000074710000-0x0000000074DFE000-memory.dmpFilesize
6.9MB
-
memory/1316-9-0x00000000024C0000-0x00000000024C1000-memory.dmpFilesize
4KB
-
memory/1316-18-0x0000000002670000-0x0000000002671000-memory.dmpFilesize
4KB
-
memory/1316-30-0x0000000006080000-0x0000000006081000-memory.dmpFilesize
4KB
-
memory/1316-13-0x0000000004842000-0x0000000004843000-memory.dmpFilesize
4KB
-
memory/1316-31-0x00000000060E0000-0x00000000060E1000-memory.dmpFilesize
4KB
-
memory/1316-25-0x0000000006040000-0x0000000006041000-memory.dmpFilesize
4KB
-
memory/1316-39-0x000000007EF30000-0x000000007EF31000-memory.dmpFilesize
4KB
-
memory/1316-21-0x0000000005240000-0x0000000005241000-memory.dmpFilesize
4KB
-
memory/1368-5-0x0000000004300000-0x0000000004391000-memory.dmpFilesize
580KB
-
memory/1368-11-0x0000000004D70000-0x0000000004D71000-memory.dmpFilesize
4KB
-
memory/1368-3-0x0000000000A30000-0x0000000000A31000-memory.dmpFilesize
4KB
-
memory/1368-2-0x0000000074710000-0x0000000074DFE000-memory.dmpFilesize
6.9MB
-
memory/1368-14-0x00000000003B0000-0x00000000003BF000-memory.dmpFilesize
60KB
-
memory/1668-41-0x00000000021F0000-0x0000000002201000-memory.dmpFilesize
68KB
-
memory/1668-40-0x0000000000000000-mapping.dmp
-
memory/1668-42-0x0000000000350000-0x0000000000351000-memory.dmpFilesize
4KB
-
memory/1892-16-0x00000000004643AE-mapping.dmp
-
memory/1892-22-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/1892-19-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1892-17-0x0000000074710000-0x0000000074DFE000-memory.dmpFilesize
6.9MB
-
memory/1892-15-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB