Analysis
-
max time kernel
49s -
max time network
142s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27-07-2021 22:01
Static task
static1
Behavioral task
behavioral1
Sample
telex SO#1KSZ019769-pdf.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
telex SO#1KSZ019769-pdf.exe
Resource
win10v20210410
General
-
Target
telex SO#1KSZ019769-pdf.exe
-
Size
833KB
-
MD5
e745b5bb83dcd7045e2f1e6396d7e074
-
SHA1
dc415847e2a782d2f714da53bb5a8e2b18a67f1b
-
SHA256
9cb2740a3219b5aaa8d26ca22bf7a2088d66f1e1c37420dfe8121e0c5f0df2b7
-
SHA512
40708fde86f4332c705ce90553ad518f8bcc3fe56206ebd4af7020c8a5e6813f69bd294872d35921b234829105f5947de9a905bb15a531ba4b38d4c3ea1fce9f
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
25 - Username:
admin@evapimlogs.com - Password:
BkKMmzZ1
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
telex SO#1KSZ019769-pdf.exedescription pid process target process PID 752 set thread context of 988 752 telex SO#1KSZ019769-pdf.exe telex SO#1KSZ019769-pdf.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 620 988 WerFault.exe telex SO#1KSZ019769-pdf.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
telex SO#1KSZ019769-pdf.exeWerFault.exepid process 988 telex SO#1KSZ019769-pdf.exe 620 WerFault.exe 620 WerFault.exe 620 WerFault.exe 620 WerFault.exe 620 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
telex SO#1KSZ019769-pdf.exeWerFault.exedescription pid process Token: SeDebugPrivilege 988 telex SO#1KSZ019769-pdf.exe Token: SeDebugPrivilege 620 WerFault.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
telex SO#1KSZ019769-pdf.exetelex SO#1KSZ019769-pdf.exedescription pid process target process PID 752 wrote to memory of 988 752 telex SO#1KSZ019769-pdf.exe telex SO#1KSZ019769-pdf.exe PID 752 wrote to memory of 988 752 telex SO#1KSZ019769-pdf.exe telex SO#1KSZ019769-pdf.exe PID 752 wrote to memory of 988 752 telex SO#1KSZ019769-pdf.exe telex SO#1KSZ019769-pdf.exe PID 752 wrote to memory of 988 752 telex SO#1KSZ019769-pdf.exe telex SO#1KSZ019769-pdf.exe PID 752 wrote to memory of 988 752 telex SO#1KSZ019769-pdf.exe telex SO#1KSZ019769-pdf.exe PID 752 wrote to memory of 988 752 telex SO#1KSZ019769-pdf.exe telex SO#1KSZ019769-pdf.exe PID 752 wrote to memory of 988 752 telex SO#1KSZ019769-pdf.exe telex SO#1KSZ019769-pdf.exe PID 752 wrote to memory of 988 752 telex SO#1KSZ019769-pdf.exe telex SO#1KSZ019769-pdf.exe PID 752 wrote to memory of 988 752 telex SO#1KSZ019769-pdf.exe telex SO#1KSZ019769-pdf.exe PID 988 wrote to memory of 620 988 telex SO#1KSZ019769-pdf.exe WerFault.exe PID 988 wrote to memory of 620 988 telex SO#1KSZ019769-pdf.exe WerFault.exe PID 988 wrote to memory of 620 988 telex SO#1KSZ019769-pdf.exe WerFault.exe PID 988 wrote to memory of 620 988 telex SO#1KSZ019769-pdf.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\telex SO#1KSZ019769-pdf.exe"C:\Users\Admin\AppData\Local\Temp\telex SO#1KSZ019769-pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\telex SO#1KSZ019769-pdf.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 11003⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/620-72-0x0000000000000000-mapping.dmp
-
memory/620-73-0x0000000000760000-0x0000000000761000-memory.dmpFilesize
4KB
-
memory/752-60-0x00000000008C0000-0x00000000008C1000-memory.dmpFilesize
4KB
-
memory/752-62-0x0000000001DA0000-0x0000000001DEA000-memory.dmpFilesize
296KB
-
memory/752-63-0x0000000004BD0000-0x0000000004BD1000-memory.dmpFilesize
4KB
-
memory/752-64-0x00000000003B0000-0x00000000003B2000-memory.dmpFilesize
8KB
-
memory/752-65-0x0000000004D10000-0x0000000004D7D000-memory.dmpFilesize
436KB
-
memory/752-66-0x0000000001F00000-0x0000000001F20000-memory.dmpFilesize
128KB
-
memory/988-67-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/988-68-0x000000000041F89E-mapping.dmp
-
memory/988-69-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/988-71-0x0000000004AD0000-0x0000000004AD1000-memory.dmpFilesize
4KB