Analysis
-
max time kernel
136s -
max time network
166s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
22-07-2021 11:32
Static task
static1
Behavioral task
behavioral1
Sample
Specifications_Details_20337_FLQ.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Specifications_Details_20337_FLQ.exe
Resource
win10v20210408
General
-
Target
Specifications_Details_20337_FLQ.exe
-
Size
503KB
-
MD5
432dafd9a9d895a6be98225d93533bc9
-
SHA1
f8372831247316dad9651f0f7dc8c94adfcc26bd
-
SHA256
f21588a5a2118f8b06488d6ee22be10c90016e672c40e20ea92572fd955edde3
-
SHA512
b5f7b6610d0dd89a639815602d94c6ffd8f7a5afd807bfaef6c58589f0a44a126b90b7cb10b893899e6317abf262facc497ed66a015ca4c7f64caa44848120a3
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
D#$M779Bx*!2^111
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Specifications_Details_20337_FLQ.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\notepad = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\notepad\\notepad.exe\"" Specifications_Details_20337_FLQ.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 freegeoip.app 6 checkip.dyndns.org 10 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Specifications_Details_20337_FLQ.exedescription pid process target process PID 640 set thread context of 828 640 Specifications_Details_20337_FLQ.exe Specifications_Details_20337_FLQ.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Specifications_Details_20337_FLQ.exeSpecifications_Details_20337_FLQ.exepid process 640 Specifications_Details_20337_FLQ.exe 640 Specifications_Details_20337_FLQ.exe 828 Specifications_Details_20337_FLQ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Specifications_Details_20337_FLQ.exeSpecifications_Details_20337_FLQ.exedescription pid process Token: SeDebugPrivilege 640 Specifications_Details_20337_FLQ.exe Token: SeDebugPrivilege 828 Specifications_Details_20337_FLQ.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Specifications_Details_20337_FLQ.exedescription pid process target process PID 640 wrote to memory of 828 640 Specifications_Details_20337_FLQ.exe Specifications_Details_20337_FLQ.exe PID 640 wrote to memory of 828 640 Specifications_Details_20337_FLQ.exe Specifications_Details_20337_FLQ.exe PID 640 wrote to memory of 828 640 Specifications_Details_20337_FLQ.exe Specifications_Details_20337_FLQ.exe PID 640 wrote to memory of 828 640 Specifications_Details_20337_FLQ.exe Specifications_Details_20337_FLQ.exe PID 640 wrote to memory of 828 640 Specifications_Details_20337_FLQ.exe Specifications_Details_20337_FLQ.exe PID 640 wrote to memory of 828 640 Specifications_Details_20337_FLQ.exe Specifications_Details_20337_FLQ.exe PID 640 wrote to memory of 828 640 Specifications_Details_20337_FLQ.exe Specifications_Details_20337_FLQ.exe PID 640 wrote to memory of 828 640 Specifications_Details_20337_FLQ.exe Specifications_Details_20337_FLQ.exe PID 640 wrote to memory of 828 640 Specifications_Details_20337_FLQ.exe Specifications_Details_20337_FLQ.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Specifications_Details_20337_FLQ.exe"C:\Users\Admin\AppData\Local\Temp\Specifications_Details_20337_FLQ.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\Specifications_Details_20337_FLQ.exeC:\Users\Admin\AppData\Local\Temp\Specifications_Details_20337_FLQ.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/640-59-0x0000000000BE0000-0x0000000000BE1000-memory.dmpFilesize
4KB
-
memory/640-61-0x0000000004CE0000-0x0000000004CE1000-memory.dmpFilesize
4KB
-
memory/640-62-0x00000000041F0000-0x0000000004241000-memory.dmpFilesize
324KB
-
memory/640-67-0x0000000005000000-0x0000000005081000-memory.dmpFilesize
516KB
-
memory/828-68-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/828-69-0x000000000041FE5E-mapping.dmp
-
memory/828-70-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/828-72-0x0000000002160000-0x0000000002161000-memory.dmpFilesize
4KB