Analysis
-
max time kernel
22s -
max time network
123s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
29-01-2021 16:36
Static task
static1
Behavioral task
behavioral1
Sample
POL 495.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
POL 495.exe
Resource
win10v20201028
General
-
Target
POL 495.exe
-
Size
575KB
-
MD5
3e8d7d953385247857ff9800b08c71fa
-
SHA1
4d40b4b61bfda3f6c2d560f69259ec27d5f3b06a
-
SHA256
a8aad152f516add6a277e2634baa324b105a90c3b02935aa2fa11ea4f0c4667e
-
SHA512
0e7f75494177f706299ce5d947a26557e8c1320bed6c003b1daf87da5bb676bcdea3fb26ed57d9765054574caf91c279b0d0b7456a1cdce93613b3f08a39c620
Malware Config
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2008-9-0x0000000000400000-0x0000000000468000-memory.dmp family_snakekeylogger behavioral1/memory/2008-10-0x0000000000463D7E-mapping.dmp family_snakekeylogger behavioral1/memory/2008-13-0x0000000000400000-0x0000000000468000-memory.dmp family_snakekeylogger -
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
Processes:
resource yara_rule behavioral1/memory/1752-5-0x00000000009B0000-0x0000000000A3E000-memory.dmp beds_protector -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 checkip.dyndns.org 10 freegeoip.app 11 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
POL 495.exedescription pid process target process PID 1752 set thread context of 2008 1752 POL 495.exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
POL 495.exeRegAsm.exepid process 1752 POL 495.exe 2008 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
POL 495.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 1752 POL 495.exe Token: SeDebugPrivilege 2008 RegAsm.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
POL 495.exedescription pid process target process PID 1752 wrote to memory of 1500 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 1500 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 1500 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 1500 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 1500 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 1500 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 1500 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 2008 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 2008 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 2008 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 2008 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 2008 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 2008 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 2008 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 2008 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 2008 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 2008 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 2008 1752 POL 495.exe RegAsm.exe PID 1752 wrote to memory of 2008 1752 POL 495.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\POL 495.exe"C:\Users\Admin\AppData\Local\Temp\POL 495.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1752-2-0x00000000741E0000-0x00000000748CE000-memory.dmpFilesize
6.9MB
-
memory/1752-3-0x0000000000EA0000-0x0000000000EA1000-memory.dmpFilesize
4KB
-
memory/1752-5-0x00000000009B0000-0x0000000000A3E000-memory.dmpFilesize
568KB
-
memory/1752-6-0x0000000004BE0000-0x0000000004BE1000-memory.dmpFilesize
4KB
-
memory/1752-7-0x00000000005E0000-0x00000000005EF000-memory.dmpFilesize
60KB
-
memory/1752-8-0x0000000004BE5000-0x0000000004BF6000-memory.dmpFilesize
68KB
-
memory/2008-9-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2008-10-0x0000000000463D7E-mapping.dmp
-
memory/2008-11-0x0000000075EB1000-0x0000000075EB3000-memory.dmpFilesize
8KB
-
memory/2008-12-0x00000000741E0000-0x00000000748CE000-memory.dmpFilesize
6.9MB
-
memory/2008-13-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/2008-15-0x0000000000B00000-0x0000000000B01000-memory.dmpFilesize
4KB