Analysis
-
max time kernel
102s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
07-06-2021 05:52
Static task
static1
Behavioral task
behavioral1
Sample
S09900090K.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
S09900090K.exe
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
S09900090K.exe
-
Size
206KB
-
MD5
717af05a9247debb55e8a57cb5096df4
-
SHA1
c0f8e0518f372e52fa5245c1ee3992ac02e15a5f
-
SHA256
e4023297b3b3918787683d59c9ebf0c5786cdf50f42f54c50aa5571e7dae29f7
-
SHA512
13a7c5dfe3474f3c4b17a52525203953adb82a82f11e6a688543d00afc6f00eacdced92990802622c885ee88fe01c73d6297d9de6db512f282d35544a243ea15
Score
10/10
Malware Config
Extracted
Family
snakekeylogger
Credentials
Protocol: smtp- Host:
smtp.1and1.com - Port:
587 - Username:
[email protected] - Password:
Andres1.2
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Loads dropped DLL 2 IoCs
pid Process 3972 S09900090K.exe 3972 S09900090K.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\keeptnls = "C:\\Users\\Admin\\AppData\\Roaming\\nfucibtjl\\lfyinhpbx.exe" S09900090K.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 checkip.dyndns.org 10 freegeoip.app 11 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3972 set thread context of 2432 3972 S09900090K.exe 75 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2432 MSBuild.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3972 S09900090K.exe 3972 S09900090K.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2432 MSBuild.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3972 wrote to memory of 2432 3972 S09900090K.exe 75 PID 3972 wrote to memory of 2432 3972 S09900090K.exe 75 PID 3972 wrote to memory of 2432 3972 S09900090K.exe 75 PID 3972 wrote to memory of 2432 3972 S09900090K.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\S09900090K.exe"C:\Users\Admin\AppData\Local\Temp\S09900090K.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\S09900090K.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432
-