Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    28-01-2021 11:23

General

  • Target

    0b98faf626c10538ddd8ff786e1fb1f1cfeb6e05.exe

  • Size

    580KB

  • MD5

    38a0b1feccc0e9321d2cd40425e7a3fe

  • SHA1

    0b98faf626c10538ddd8ff786e1fb1f1cfeb6e05

  • SHA256

    f5d1f03033f55a7d779d07e11a876447abd4ae01aed58482706f6879931cf68c

  • SHA512

    08aa1cd18fb0d8b0c87175dbf24c70cddf4fc27314405ac319a2185fe3e2cdd4f0b61810ba11108b57e63102eb86fe6200b7a7d0582b985c7446599e313575f0

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    c44MAMBxPAEZKQf

Extracted

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger Payload 3 IoCs
  • Beds Protector Packer 1 IoCs

    Detects Beds Protector packer used to load .NET malware.

  • Drops startup file 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b98faf626c10538ddd8ff786e1fb1f1cfeb6e05.exe
    "C:\Users\Admin\AppData\Local\Temp\0b98faf626c10538ddd8ff786e1fb1f1cfeb6e05.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:744
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
      "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\0b98faf626c10538ddd8ff786e1fb1f1cfeb6e05.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe'
      2⤵
      • Drops startup file
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2000
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1956

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/744-2-0x0000000073FF0000-0x00000000746DE000-memory.dmp
    Filesize

    6.9MB

  • memory/744-3-0x0000000000310000-0x0000000000311000-memory.dmp
    Filesize

    4KB

  • memory/744-5-0x0000000002110000-0x000000000219F000-memory.dmp
    Filesize

    572KB

  • memory/744-6-0x0000000004A80000-0x0000000004A81000-memory.dmp
    Filesize

    4KB

  • memory/744-9-0x0000000004A85000-0x0000000004A96000-memory.dmp
    Filesize

    68KB

  • memory/744-13-0x0000000000690000-0x000000000069F000-memory.dmp
    Filesize

    60KB

  • memory/1956-24-0x0000000004B30000-0x0000000004B31000-memory.dmp
    Filesize

    4KB

  • memory/1956-21-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/1956-20-0x0000000073FF0000-0x00000000746DE000-memory.dmp
    Filesize

    6.9MB

  • memory/1956-17-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/1956-18-0x00000000004648CE-mapping.dmp
  • memory/2000-15-0x0000000002822000-0x0000000002823000-memory.dmp
    Filesize

    4KB

  • memory/2000-23-0x0000000005280000-0x0000000005281000-memory.dmp
    Filesize

    4KB

  • memory/2000-16-0x0000000002540000-0x0000000002541000-memory.dmp
    Filesize

    4KB

  • memory/2000-12-0x00000000048D0000-0x00000000048D1000-memory.dmp
    Filesize

    4KB

  • memory/2000-11-0x0000000000B00000-0x0000000000B01000-memory.dmp
    Filesize

    4KB

  • memory/2000-10-0x0000000073FF0000-0x00000000746DE000-memory.dmp
    Filesize

    6.9MB

  • memory/2000-8-0x0000000075E51000-0x0000000075E53000-memory.dmp
    Filesize

    8KB

  • memory/2000-14-0x0000000002820000-0x0000000002821000-memory.dmp
    Filesize

    4KB

  • memory/2000-7-0x0000000000000000-mapping.dmp
  • memory/2000-27-0x0000000006000000-0x0000000006001000-memory.dmp
    Filesize

    4KB

  • memory/2000-32-0x0000000006040000-0x0000000006041000-memory.dmp
    Filesize

    4KB

  • memory/2000-33-0x00000000060F0000-0x00000000060F1000-memory.dmp
    Filesize

    4KB

  • memory/2000-40-0x0000000006240000-0x0000000006241000-memory.dmp
    Filesize

    4KB

  • memory/2000-41-0x000000007EF30000-0x000000007EF31000-memory.dmp
    Filesize

    4KB