Analysis

  • max time kernel
    252s
  • max time network
    263s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    11-06-2021 03:41

General

  • Target

    Ecol Sp RFQ.122113.exe

  • Size

    836KB

  • MD5

    9a2225e1b9acd802016c1d880528de49

  • SHA1

    0e9b0abd02fd0c321ddbd6b3140c7c3cf0fa1d9d

  • SHA256

    38b556205aa56d97e3e6e2702bd4822b489403e3903132493893e5aced988b83

  • SHA512

    424029d7bcd9276a7b1c920f80feda282a53f61f75bc665c5b388c5cc8b2a148489bbf1ef67dedd635c3999284145899d725188b54cff792edfbf173859395ae

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1841252439:AAFeBNk12wAgfxXFXtqpw50JT4iCgTc-FsM/sendMessage?chat_id=-487183096

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ecol Sp RFQ.122113.exe
    "C:\Users\Admin\AppData\Local\Temp\Ecol Sp RFQ.122113.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
        PID:3364
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2792

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1840-114-0x0000000000420000-0x0000000000421000-memory.dmp
      Filesize

      4KB

    • memory/1840-116-0x0000000004D30000-0x0000000004D31000-memory.dmp
      Filesize

      4KB

    • memory/1840-117-0x0000000005310000-0x0000000005311000-memory.dmp
      Filesize

      4KB

    • memory/1840-118-0x0000000004EB0000-0x0000000004EB1000-memory.dmp
      Filesize

      4KB

    • memory/1840-119-0x0000000004D00000-0x0000000004D01000-memory.dmp
      Filesize

      4KB

    • memory/1840-120-0x0000000005010000-0x0000000005011000-memory.dmp
      Filesize

      4KB

    • memory/1840-121-0x0000000004E10000-0x000000000530E000-memory.dmp
      Filesize

      5.0MB

    • memory/1840-122-0x0000000004DE0000-0x0000000004DFE000-memory.dmp
      Filesize

      120KB

    • memory/1840-123-0x0000000005270000-0x00000000052E7000-memory.dmp
      Filesize

      476KB

    • memory/1840-124-0x0000000007EE0000-0x0000000007F18000-memory.dmp
      Filesize

      224KB

    • memory/2792-125-0x0000000000400000-0x0000000000424000-memory.dmp
      Filesize

      144KB

    • memory/2792-126-0x000000000041F83E-mapping.dmp
    • memory/2792-131-0x0000000005430000-0x000000000592E000-memory.dmp
      Filesize

      5.0MB

    • memory/2792-132-0x0000000006400000-0x0000000006401000-memory.dmp
      Filesize

      4KB