Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    28-01-2021 11:23

General

  • Target

    0b98faf626c10538ddd8ff786e1fb1f1cfeb6e05.exe

  • Size

    580KB

  • MD5

    38a0b1feccc0e9321d2cd40425e7a3fe

  • SHA1

    0b98faf626c10538ddd8ff786e1fb1f1cfeb6e05

  • SHA256

    f5d1f03033f55a7d779d07e11a876447abd4ae01aed58482706f6879931cf68c

  • SHA512

    08aa1cd18fb0d8b0c87175dbf24c70cddf4fc27314405ac319a2185fe3e2cdd4f0b61810ba11108b57e63102eb86fe6200b7a7d0582b985c7446599e313575f0

Malware Config

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger Payload 2 IoCs
  • Beds Protector Packer 1 IoCs

    Detects Beds Protector packer used to load .NET malware.

  • Drops startup file 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b98faf626c10538ddd8ff786e1fb1f1cfeb6e05.exe
    "C:\Users\Admin\AppData\Local\Temp\0b98faf626c10538ddd8ff786e1fb1f1cfeb6e05.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:580
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
      "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\0b98faf626c10538ddd8ff786e1fb1f1cfeb6e05.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe'
      2⤵
      • Drops startup file
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3132
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2596

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/580-16-0x0000000004D53000-0x0000000004D55000-memory.dmp
    Filesize

    8KB

  • memory/580-3-0x0000000000200000-0x0000000000201000-memory.dmp
    Filesize

    4KB

  • memory/580-5-0x0000000005040000-0x0000000005041000-memory.dmp
    Filesize

    4KB

  • memory/580-6-0x0000000004B40000-0x0000000004B41000-memory.dmp
    Filesize

    4KB

  • memory/580-7-0x0000000004BE0000-0x0000000004C6F000-memory.dmp
    Filesize

    572KB

  • memory/580-8-0x0000000005540000-0x0000000005541000-memory.dmp
    Filesize

    4KB

  • memory/580-9-0x0000000004C70000-0x0000000004C71000-memory.dmp
    Filesize

    4KB

  • memory/580-10-0x0000000004D50000-0x0000000004D51000-memory.dmp
    Filesize

    4KB

  • memory/580-11-0x0000000004DA0000-0x0000000004DA1000-memory.dmp
    Filesize

    4KB

  • memory/580-12-0x0000000008650000-0x0000000008651000-memory.dmp
    Filesize

    4KB

  • memory/580-2-0x0000000073560000-0x0000000073C4E000-memory.dmp
    Filesize

    6.9MB

  • memory/580-20-0x0000000005030000-0x000000000503F000-memory.dmp
    Filesize

    60KB

  • memory/2596-32-0x0000000005520000-0x0000000005521000-memory.dmp
    Filesize

    4KB

  • memory/2596-25-0x0000000073560000-0x0000000073C4E000-memory.dmp
    Filesize

    6.9MB

  • memory/2596-36-0x00000000065F0000-0x00000000065F1000-memory.dmp
    Filesize

    4KB

  • memory/2596-22-0x00000000004648CE-mapping.dmp
  • memory/2596-21-0x0000000000400000-0x000000000046A000-memory.dmp
    Filesize

    424KB

  • memory/3132-33-0x00000000071E0000-0x00000000071E1000-memory.dmp
    Filesize

    4KB

  • memory/3132-15-0x0000000004B20000-0x0000000004B21000-memory.dmp
    Filesize

    4KB

  • memory/3132-19-0x0000000004BB0000-0x0000000004BB1000-memory.dmp
    Filesize

    4KB

  • memory/3132-23-0x0000000007540000-0x0000000007541000-memory.dmp
    Filesize

    4KB

  • memory/3132-14-0x0000000073560000-0x0000000073C4E000-memory.dmp
    Filesize

    6.9MB

  • memory/3132-26-0x0000000007C50000-0x0000000007C51000-memory.dmp
    Filesize

    4KB

  • memory/3132-17-0x0000000004BB2000-0x0000000004BB3000-memory.dmp
    Filesize

    4KB

  • memory/3132-13-0x0000000000000000-mapping.dmp
  • memory/3132-24-0x0000000007D30000-0x0000000007D31000-memory.dmp
    Filesize

    4KB

  • memory/3132-34-0x0000000007CC0000-0x0000000007CC1000-memory.dmp
    Filesize

    4KB

  • memory/3132-35-0x0000000008650000-0x0000000008651000-memory.dmp
    Filesize

    4KB

  • memory/3132-18-0x00000000075B0000-0x00000000075B1000-memory.dmp
    Filesize

    4KB

  • memory/3132-39-0x0000000009630000-0x0000000009631000-memory.dmp
    Filesize

    4KB

  • memory/3132-40-0x00000000092D0000-0x00000000092D1000-memory.dmp
    Filesize

    4KB

  • memory/3132-41-0x0000000009340000-0x0000000009341000-memory.dmp
    Filesize

    4KB

  • memory/3132-43-0x0000000004BB3000-0x0000000004BB4000-memory.dmp
    Filesize

    4KB