Analysis
-
max time kernel
252s -
max time network
263s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
11-06-2021 03:41
Static task
static1
Behavioral task
behavioral1
Sample
Ecol Sp RFQ.122113.exe
Resource
win10v20210408
General
-
Target
Ecol Sp RFQ.122113.exe
-
Size
836KB
-
MD5
9a2225e1b9acd802016c1d880528de49
-
SHA1
0e9b0abd02fd0c321ddbd6b3140c7c3cf0fa1d9d
-
SHA256
38b556205aa56d97e3e6e2702bd4822b489403e3903132493893e5aced988b83
-
SHA512
424029d7bcd9276a7b1c920f80feda282a53f61f75bc665c5b388c5cc8b2a148489bbf1ef67dedd635c3999284145899d725188b54cff792edfbf173859395ae
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1841252439:AAFeBNk12wAgfxXFXtqpw50JT4iCgTc-FsM/sendMessage?chat_id=-487183096
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 freegeoip.app 19 freegeoip.app 15 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Ecol Sp RFQ.122113.exedescription pid process target process PID 1840 set thread context of 2792 1840 Ecol Sp RFQ.122113.exe MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Ecol Sp RFQ.122113.exeMSBuild.exepid process 1840 Ecol Sp RFQ.122113.exe 1840 Ecol Sp RFQ.122113.exe 2792 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Ecol Sp RFQ.122113.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 1840 Ecol Sp RFQ.122113.exe Token: SeDebugPrivilege 2792 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Ecol Sp RFQ.122113.exedescription pid process target process PID 1840 wrote to memory of 3364 1840 Ecol Sp RFQ.122113.exe MSBuild.exe PID 1840 wrote to memory of 3364 1840 Ecol Sp RFQ.122113.exe MSBuild.exe PID 1840 wrote to memory of 3364 1840 Ecol Sp RFQ.122113.exe MSBuild.exe PID 1840 wrote to memory of 2792 1840 Ecol Sp RFQ.122113.exe MSBuild.exe PID 1840 wrote to memory of 2792 1840 Ecol Sp RFQ.122113.exe MSBuild.exe PID 1840 wrote to memory of 2792 1840 Ecol Sp RFQ.122113.exe MSBuild.exe PID 1840 wrote to memory of 2792 1840 Ecol Sp RFQ.122113.exe MSBuild.exe PID 1840 wrote to memory of 2792 1840 Ecol Sp RFQ.122113.exe MSBuild.exe PID 1840 wrote to memory of 2792 1840 Ecol Sp RFQ.122113.exe MSBuild.exe PID 1840 wrote to memory of 2792 1840 Ecol Sp RFQ.122113.exe MSBuild.exe PID 1840 wrote to memory of 2792 1840 Ecol Sp RFQ.122113.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ecol Sp RFQ.122113.exe"C:\Users\Admin\AppData\Local\Temp\Ecol Sp RFQ.122113.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1840-114-0x0000000000420000-0x0000000000421000-memory.dmpFilesize
4KB
-
memory/1840-116-0x0000000004D30000-0x0000000004D31000-memory.dmpFilesize
4KB
-
memory/1840-117-0x0000000005310000-0x0000000005311000-memory.dmpFilesize
4KB
-
memory/1840-118-0x0000000004EB0000-0x0000000004EB1000-memory.dmpFilesize
4KB
-
memory/1840-119-0x0000000004D00000-0x0000000004D01000-memory.dmpFilesize
4KB
-
memory/1840-120-0x0000000005010000-0x0000000005011000-memory.dmpFilesize
4KB
-
memory/1840-121-0x0000000004E10000-0x000000000530E000-memory.dmpFilesize
5.0MB
-
memory/1840-122-0x0000000004DE0000-0x0000000004DFE000-memory.dmpFilesize
120KB
-
memory/1840-123-0x0000000005270000-0x00000000052E7000-memory.dmpFilesize
476KB
-
memory/1840-124-0x0000000007EE0000-0x0000000007F18000-memory.dmpFilesize
224KB
-
memory/2792-125-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/2792-126-0x000000000041F83E-mapping.dmp
-
memory/2792-131-0x0000000005430000-0x000000000592E000-memory.dmpFilesize
5.0MB
-
memory/2792-132-0x0000000006400000-0x0000000006401000-memory.dmpFilesize
4KB