Analysis

  • max time kernel
    21s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    20-01-2021 06:30

General

  • Target

    CHIKWA.exe

  • Size

    35KB

  • MD5

    add9b88583e5da86b52a7747ebdff087

  • SHA1

    277ac2d7b74ba414126c187e22ee93bbde025060

  • SHA256

    f53b0fa70af0d73053259d43ea39414707a6472b793d561220aee8b21ceb8436

  • SHA512

    679d8f135473a1d926868528859542d69198e2d62365cb7e7d7b61ba9ba7a82cb2329da04e0308a8b0237f1d63e2674f6bd72b77ad13100f2ea8b5a5e4ec2bce

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger Payload 8 IoCs
  • Drops startup file 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 11 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CHIKWA.exe
    "C:\Users\Admin\AppData\Local\Temp\CHIKWA.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:296
    • C:\Users\Admin\AppData\Local\Temp\CHIKWA.exe
      "C:\Users\Admin\AppData\Local\Temp\CHIKWA.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1512
    • C:\Users\Admin\AppData\Local\Temp\CHIKWA.exe
      "C:\Users\Admin\AppData\Local\Temp\CHIKWA.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1680
    • C:\Users\Admin\AppData\Local\Temp\CHIKWA.exe
      "C:\Users\Admin\AppData\Local\Temp\CHIKWA.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1836
    • C:\Users\Admin\AppData\Local\Temp\CHIKWA.exe
      "C:\Users\Admin\AppData\Local\Temp\CHIKWA.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1516
    • C:\Users\Admin\AppData\Local\Temp\CHIKWA.exe
      "C:\Users\Admin\AppData\Local\Temp\CHIKWA.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1340

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/296-11-0x0000000000310000-0x0000000000311000-memory.dmp
    Filesize

    4KB

  • memory/296-3-0x0000000000B10000-0x0000000000B11000-memory.dmp
    Filesize

    4KB

  • memory/296-5-0x0000000004BD0000-0x0000000004BD1000-memory.dmp
    Filesize

    4KB

  • memory/296-6-0x00000000053D0000-0x0000000005463000-memory.dmp
    Filesize

    588KB

  • memory/296-2-0x00000000748D0000-0x0000000074FBE000-memory.dmp
    Filesize

    6.9MB

  • memory/1340-29-0x00000000748D0000-0x0000000074FBE000-memory.dmp
    Filesize

    6.9MB

  • memory/1340-27-0x000000000046571E-mapping.dmp
  • memory/1340-36-0x0000000004B00000-0x0000000004B01000-memory.dmp
    Filesize

    4KB

  • memory/1512-10-0x00000000748D0000-0x0000000074FBE000-memory.dmp
    Filesize

    6.9MB

  • memory/1512-13-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/1512-8-0x000000000046571E-mapping.dmp
  • memory/1512-33-0x0000000004760000-0x0000000004761000-memory.dmp
    Filesize

    4KB

  • memory/1512-7-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/1516-25-0x00000000748D0000-0x0000000074FBE000-memory.dmp
    Filesize

    6.9MB

  • memory/1516-21-0x000000000046571E-mapping.dmp
  • memory/1516-37-0x0000000004830000-0x0000000004831000-memory.dmp
    Filesize

    4KB

  • memory/1680-14-0x00000000748D0000-0x0000000074FBE000-memory.dmp
    Filesize

    6.9MB

  • memory/1680-32-0x00000000049A0000-0x00000000049A1000-memory.dmp
    Filesize

    4KB

  • memory/1680-12-0x000000000046571E-mapping.dmp
  • memory/1836-31-0x0000000004A20000-0x0000000004A21000-memory.dmp
    Filesize

    4KB

  • memory/1836-18-0x00000000748D0000-0x0000000074FBE000-memory.dmp
    Filesize

    6.9MB

  • memory/1836-17-0x000000000046571E-mapping.dmp