Analysis
-
max time kernel
47s -
max time network
148s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
20-06-2021 14:44
Static task
static1
Behavioral task
behavioral1
Sample
SKGCM_Arabbank_Transfer_document2021doc.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
SKGCM_Arabbank_Transfer_document2021doc.exe
Resource
win10v20210408
General
-
Target
SKGCM_Arabbank_Transfer_document2021doc.exe
-
Size
510KB
-
MD5
d2562ba3cc578a7851ffcf98585aaa9b
-
SHA1
27100dd29d91f8d0e0aafcc9b93d184378478728
-
SHA256
2335bfea54b33abe93e21697e7d2ed09527fbcf9245d8ea2ca2d062c1a89a0a6
-
SHA512
39e1cac308bed346cb989396cacab5199462c35a72dacfbd25e2773f05d32b374aff8142ab425957992ba8b10942f691119e54743f034514a8912e0b36d4ce2b
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.stomania.net - Port:
587 - Username:
info@stomania.net - Password:
WPT!UgU7
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1960-66-0x0000000000400000-0x000000000046A000-memory.dmp family_snakekeylogger behavioral1/memory/1960-67-0x00000000004646AE-mapping.dmp family_snakekeylogger behavioral1/memory/1960-68-0x0000000000400000-0x000000000046A000-memory.dmp family_snakekeylogger -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 checkip.dyndns.org 10 freegeoip.app 11 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SKGCM_Arabbank_Transfer_document2021doc.exedescription pid process target process PID 2004 set thread context of 1960 2004 SKGCM_Arabbank_Transfer_document2021doc.exe SKGCM_Arabbank_Transfer_document2021doc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
SKGCM_Arabbank_Transfer_document2021doc.exepid process 1960 SKGCM_Arabbank_Transfer_document2021doc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SKGCM_Arabbank_Transfer_document2021doc.exedescription pid process Token: SeDebugPrivilege 1960 SKGCM_Arabbank_Transfer_document2021doc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
SKGCM_Arabbank_Transfer_document2021doc.exedescription pid process target process PID 2004 wrote to memory of 1960 2004 SKGCM_Arabbank_Transfer_document2021doc.exe SKGCM_Arabbank_Transfer_document2021doc.exe PID 2004 wrote to memory of 1960 2004 SKGCM_Arabbank_Transfer_document2021doc.exe SKGCM_Arabbank_Transfer_document2021doc.exe PID 2004 wrote to memory of 1960 2004 SKGCM_Arabbank_Transfer_document2021doc.exe SKGCM_Arabbank_Transfer_document2021doc.exe PID 2004 wrote to memory of 1960 2004 SKGCM_Arabbank_Transfer_document2021doc.exe SKGCM_Arabbank_Transfer_document2021doc.exe PID 2004 wrote to memory of 1960 2004 SKGCM_Arabbank_Transfer_document2021doc.exe SKGCM_Arabbank_Transfer_document2021doc.exe PID 2004 wrote to memory of 1960 2004 SKGCM_Arabbank_Transfer_document2021doc.exe SKGCM_Arabbank_Transfer_document2021doc.exe PID 2004 wrote to memory of 1960 2004 SKGCM_Arabbank_Transfer_document2021doc.exe SKGCM_Arabbank_Transfer_document2021doc.exe PID 2004 wrote to memory of 1960 2004 SKGCM_Arabbank_Transfer_document2021doc.exe SKGCM_Arabbank_Transfer_document2021doc.exe PID 2004 wrote to memory of 1960 2004 SKGCM_Arabbank_Transfer_document2021doc.exe SKGCM_Arabbank_Transfer_document2021doc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKGCM_Arabbank_Transfer_document2021doc.exe"C:\Users\Admin\AppData\Local\Temp\SKGCM_Arabbank_Transfer_document2021doc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SKGCM_Arabbank_Transfer_document2021doc.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1960-66-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1960-67-0x00000000004646AE-mapping.dmp
-
memory/1960-68-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/1960-70-0x00000000022C0000-0x00000000022C1000-memory.dmpFilesize
4KB
-
memory/2004-60-0x0000000000B10000-0x0000000000B11000-memory.dmpFilesize
4KB
-
memory/2004-62-0x0000000007400000-0x0000000007401000-memory.dmpFilesize
4KB
-
memory/2004-63-0x0000000000410000-0x0000000000412000-memory.dmpFilesize
8KB
-
memory/2004-64-0x00000000022E0000-0x0000000002363000-memory.dmpFilesize
524KB
-
memory/2004-65-0x0000000004B90000-0x0000000004C01000-memory.dmpFilesize
452KB