Analysis
-
max time kernel
18s -
max time network
121s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
31-01-2021 07:42
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT DETAILS.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
PAYMENT DETAILS.exe
Resource
win10v20201028
General
-
Target
PAYMENT DETAILS.exe
-
Size
576KB
-
MD5
f58246abe4c6c20a44a110137d141310
-
SHA1
5fac0ab48685e8154bfc3cd3a7fe36f092d990b8
-
SHA256
47ffaf572157824fb5a40a2706bd72f3e0e43090c621c9d676031fd80bb35fe5
-
SHA512
2ffee4c3994506fdbe3da6aeb7844868b7f12989d3f1717a9d80f1d260cf17340adc5c936ee6dcdf9c24a77ff8f7f375563e88116f08cb75e7f96899948362f1
Malware Config
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1220-8-0x0000000000400000-0x0000000000468000-memory.dmp family_snakekeylogger behavioral1/memory/1220-9-0x0000000000463E5E-mapping.dmp family_snakekeylogger behavioral1/memory/1220-12-0x0000000000400000-0x0000000000468000-memory.dmp family_snakekeylogger -
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
Processes:
resource yara_rule behavioral1/memory/1204-5-0x0000000004730000-0x00000000047BE000-memory.dmp beds_protector -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 checkip.dyndns.org 10 freegeoip.app 11 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PAYMENT DETAILS.exedescription pid process target process PID 1204 set thread context of 1220 1204 PAYMENT DETAILS.exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
RegAsm.exepid process 1220 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid process Token: SeDebugPrivilege 1220 RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
PAYMENT DETAILS.exedescription pid process target process PID 1204 wrote to memory of 1220 1204 PAYMENT DETAILS.exe RegAsm.exe PID 1204 wrote to memory of 1220 1204 PAYMENT DETAILS.exe RegAsm.exe PID 1204 wrote to memory of 1220 1204 PAYMENT DETAILS.exe RegAsm.exe PID 1204 wrote to memory of 1220 1204 PAYMENT DETAILS.exe RegAsm.exe PID 1204 wrote to memory of 1220 1204 PAYMENT DETAILS.exe RegAsm.exe PID 1204 wrote to memory of 1220 1204 PAYMENT DETAILS.exe RegAsm.exe PID 1204 wrote to memory of 1220 1204 PAYMENT DETAILS.exe RegAsm.exe PID 1204 wrote to memory of 1220 1204 PAYMENT DETAILS.exe RegAsm.exe PID 1204 wrote to memory of 1220 1204 PAYMENT DETAILS.exe RegAsm.exe PID 1204 wrote to memory of 1220 1204 PAYMENT DETAILS.exe RegAsm.exe PID 1204 wrote to memory of 1220 1204 PAYMENT DETAILS.exe RegAsm.exe PID 1204 wrote to memory of 1220 1204 PAYMENT DETAILS.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PAYMENT DETAILS.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT DETAILS.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1220