Analysis
-
max time kernel
132s -
max time network
143s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
22-01-2021 10:14
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe
Resource
win10v20201028
General
-
Target
SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe
-
Size
751KB
-
MD5
c7b57a6ecc4533c754e1c04789e242d0
-
SHA1
c252dbd1653bbfc5bb2941b8965c9daf41e066f6
-
SHA256
8b720e30117cfb204a068bfea7b482d1dfef2966fa32ecc2cabc3fe488674258
-
SHA512
95c3fff30f403addb4bbd74e86349303d14fa7ffe78c0e511145ac56b7b498842c774ff0e3d8636f3cee9dfb8b7cf4c80ebbce991e2d572afecf3bf593afcac8
Malware Config
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1376-25-0x0000000000400000-0x000000000046A000-memory.dmp family_snakekeylogger behavioral2/memory/1376-26-0x000000000046460E-mapping.dmp family_snakekeylogger -
Drops startup file 2 IoCs
Processes:
Powershell.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe Powershell.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 checkip.dyndns.org 14 freegeoip.app 15 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exedescription pid process target process PID 3884 set thread context of 1376 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3064 3884 WerFault.exe SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
Powershell.exeSecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exeRegAsm.exeWerFault.exepid process 3512 Powershell.exe 3512 Powershell.exe 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe 1376 RegAsm.exe 3512 Powershell.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
Powershell.exeSecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exeRegAsm.exeWerFault.exedescription pid process Token: SeDebugPrivilege 3512 Powershell.exe Token: SeDebugPrivilege 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe Token: SeDebugPrivilege 1376 RegAsm.exe Token: SeRestorePrivilege 3064 WerFault.exe Token: SeBackupPrivilege 3064 WerFault.exe Token: SeDebugPrivilege 3064 WerFault.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exedescription pid process target process PID 3884 wrote to memory of 3512 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe Powershell.exe PID 3884 wrote to memory of 3512 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe Powershell.exe PID 3884 wrote to memory of 3512 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe Powershell.exe PID 3884 wrote to memory of 1268 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe RegAsm.exe PID 3884 wrote to memory of 1268 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe RegAsm.exe PID 3884 wrote to memory of 1268 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe RegAsm.exe PID 3884 wrote to memory of 1376 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe RegAsm.exe PID 3884 wrote to memory of 1376 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe RegAsm.exe PID 3884 wrote to memory of 1376 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe RegAsm.exe PID 3884 wrote to memory of 1376 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe RegAsm.exe PID 3884 wrote to memory of 1376 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe RegAsm.exe PID 3884 wrote to memory of 1376 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe RegAsm.exe PID 3884 wrote to memory of 1376 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe RegAsm.exe PID 3884 wrote to memory of 1376 3884 SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.507.9142.2207.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe'2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3884 -s 17722⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1376-25-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1376-36-0x0000000006290000-0x0000000006291000-memory.dmpFilesize
4KB
-
memory/1376-35-0x0000000005420000-0x0000000005421000-memory.dmpFilesize
4KB
-
memory/1376-27-0x0000000073A20000-0x000000007410E000-memory.dmpFilesize
6.9MB
-
memory/1376-26-0x000000000046460E-mapping.dmp
-
memory/3064-47-0x00000000046E0000-0x00000000046E1000-memory.dmpFilesize
4KB
-
memory/3512-22-0x00000000047C0000-0x00000000047C1000-memory.dmpFilesize
4KB
-
memory/3512-16-0x0000000004700000-0x0000000004701000-memory.dmpFilesize
4KB
-
memory/3512-46-0x00000000047C3000-0x00000000047C4000-memory.dmpFilesize
4KB
-
memory/3512-44-0x0000000008F40000-0x0000000008F41000-memory.dmpFilesize
4KB
-
memory/3512-43-0x0000000008EE0000-0x0000000008EE1000-memory.dmpFilesize
4KB
-
memory/3512-14-0x0000000000000000-mapping.dmp
-
memory/3512-15-0x0000000073A20000-0x000000007410E000-memory.dmpFilesize
6.9MB
-
memory/3512-28-0x0000000007AA0000-0x0000000007AA1000-memory.dmpFilesize
4KB
-
memory/3512-17-0x0000000007390000-0x0000000007391000-memory.dmpFilesize
4KB
-
memory/3512-18-0x0000000007160000-0x0000000007161000-memory.dmpFilesize
4KB
-
memory/3512-19-0x0000000007200000-0x0000000007201000-memory.dmpFilesize
4KB
-
memory/3512-20-0x0000000007A30000-0x0000000007A31000-memory.dmpFilesize
4KB
-
memory/3512-42-0x0000000008FB0000-0x0000000008FB1000-memory.dmpFilesize
4KB
-
memory/3512-23-0x00000000047C2000-0x00000000047C3000-memory.dmpFilesize
4KB
-
memory/3512-34-0x0000000008200000-0x0000000008201000-memory.dmpFilesize
4KB
-
memory/3512-29-0x00000000082D0000-0x00000000082D1000-memory.dmpFilesize
4KB
-
memory/3884-9-0x0000000009820000-0x0000000009896000-memory.dmpFilesize
472KB
-
memory/3884-7-0x00000000054B0000-0x00000000054B1000-memory.dmpFilesize
4KB
-
memory/3884-8-0x0000000002FE0000-0x0000000002FE1000-memory.dmpFilesize
4KB
-
memory/3884-10-0x00000000099B0000-0x00000000099B1000-memory.dmpFilesize
4KB
-
memory/3884-24-0x00000000098F0000-0x00000000098FF000-memory.dmpFilesize
60KB
-
memory/3884-6-0x0000000005520000-0x0000000005521000-memory.dmpFilesize
4KB
-
memory/3884-5-0x0000000005B30000-0x0000000005B31000-memory.dmpFilesize
4KB
-
memory/3884-40-0x000000000A190000-0x000000000A191000-memory.dmpFilesize
4KB
-
memory/3884-41-0x000000000A160000-0x000000000A161000-memory.dmpFilesize
4KB
-
memory/3884-2-0x0000000073A20000-0x000000007410E000-memory.dmpFilesize
6.9MB
-
memory/3884-13-0x0000000009E10000-0x0000000009E11000-memory.dmpFilesize
4KB
-
memory/3884-12-0x0000000002FE3000-0x0000000002FE5000-memory.dmpFilesize
8KB
-
memory/3884-11-0x0000000009AC0000-0x0000000009AC1000-memory.dmpFilesize
4KB
-
memory/3884-3-0x0000000000BB0000-0x0000000000BB1000-memory.dmpFilesize
4KB
-
memory/3884-48-0x0000000002FE5000-0x0000000002FE6000-memory.dmpFilesize
4KB