Analysis

  • max time kernel
    132s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    22-01-2021 10:14

General

  • Target

    SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe

  • Size

    751KB

  • MD5

    c7b57a6ecc4533c754e1c04789e242d0

  • SHA1

    c252dbd1653bbfc5bb2941b8965c9daf41e066f6

  • SHA256

    8b720e30117cfb204a068bfea7b482d1dfef2966fa32ecc2cabc3fe488674258

  • SHA512

    95c3fff30f403addb4bbd74e86349303d14fa7ffe78c0e511145ac56b7b498842c774ff0e3d8636f3cee9dfb8b7cf4c80ebbce991e2d572afecf3bf593afcac8

Malware Config

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger Payload 2 IoCs
  • Drops startup file 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3884
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
      "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe'
      2⤵
      • Drops startup file
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3512
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:1268
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1376
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3884 -s 1772
        2⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3064

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1376-25-0x0000000000400000-0x000000000046A000-memory.dmp
      Filesize

      424KB

    • memory/1376-36-0x0000000006290000-0x0000000006291000-memory.dmp
      Filesize

      4KB

    • memory/1376-35-0x0000000005420000-0x0000000005421000-memory.dmp
      Filesize

      4KB

    • memory/1376-27-0x0000000073A20000-0x000000007410E000-memory.dmp
      Filesize

      6.9MB

    • memory/1376-26-0x000000000046460E-mapping.dmp
    • memory/3064-47-0x00000000046E0000-0x00000000046E1000-memory.dmp
      Filesize

      4KB

    • memory/3512-22-0x00000000047C0000-0x00000000047C1000-memory.dmp
      Filesize

      4KB

    • memory/3512-16-0x0000000004700000-0x0000000004701000-memory.dmp
      Filesize

      4KB

    • memory/3512-46-0x00000000047C3000-0x00000000047C4000-memory.dmp
      Filesize

      4KB

    • memory/3512-44-0x0000000008F40000-0x0000000008F41000-memory.dmp
      Filesize

      4KB

    • memory/3512-43-0x0000000008EE0000-0x0000000008EE1000-memory.dmp
      Filesize

      4KB

    • memory/3512-14-0x0000000000000000-mapping.dmp
    • memory/3512-15-0x0000000073A20000-0x000000007410E000-memory.dmp
      Filesize

      6.9MB

    • memory/3512-28-0x0000000007AA0000-0x0000000007AA1000-memory.dmp
      Filesize

      4KB

    • memory/3512-17-0x0000000007390000-0x0000000007391000-memory.dmp
      Filesize

      4KB

    • memory/3512-18-0x0000000007160000-0x0000000007161000-memory.dmp
      Filesize

      4KB

    • memory/3512-19-0x0000000007200000-0x0000000007201000-memory.dmp
      Filesize

      4KB

    • memory/3512-20-0x0000000007A30000-0x0000000007A31000-memory.dmp
      Filesize

      4KB

    • memory/3512-42-0x0000000008FB0000-0x0000000008FB1000-memory.dmp
      Filesize

      4KB

    • memory/3512-23-0x00000000047C2000-0x00000000047C3000-memory.dmp
      Filesize

      4KB

    • memory/3512-34-0x0000000008200000-0x0000000008201000-memory.dmp
      Filesize

      4KB

    • memory/3512-29-0x00000000082D0000-0x00000000082D1000-memory.dmp
      Filesize

      4KB

    • memory/3884-9-0x0000000009820000-0x0000000009896000-memory.dmp
      Filesize

      472KB

    • memory/3884-7-0x00000000054B0000-0x00000000054B1000-memory.dmp
      Filesize

      4KB

    • memory/3884-8-0x0000000002FE0000-0x0000000002FE1000-memory.dmp
      Filesize

      4KB

    • memory/3884-10-0x00000000099B0000-0x00000000099B1000-memory.dmp
      Filesize

      4KB

    • memory/3884-24-0x00000000098F0000-0x00000000098FF000-memory.dmp
      Filesize

      60KB

    • memory/3884-6-0x0000000005520000-0x0000000005521000-memory.dmp
      Filesize

      4KB

    • memory/3884-5-0x0000000005B30000-0x0000000005B31000-memory.dmp
      Filesize

      4KB

    • memory/3884-40-0x000000000A190000-0x000000000A191000-memory.dmp
      Filesize

      4KB

    • memory/3884-41-0x000000000A160000-0x000000000A161000-memory.dmp
      Filesize

      4KB

    • memory/3884-2-0x0000000073A20000-0x000000007410E000-memory.dmp
      Filesize

      6.9MB

    • memory/3884-13-0x0000000009E10000-0x0000000009E11000-memory.dmp
      Filesize

      4KB

    • memory/3884-12-0x0000000002FE3000-0x0000000002FE5000-memory.dmp
      Filesize

      8KB

    • memory/3884-11-0x0000000009AC0000-0x0000000009AC1000-memory.dmp
      Filesize

      4KB

    • memory/3884-3-0x0000000000BB0000-0x0000000000BB1000-memory.dmp
      Filesize

      4KB

    • memory/3884-48-0x0000000002FE5000-0x0000000002FE6000-memory.dmp
      Filesize

      4KB