Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
18-10-2021 16:30
Static task
static1
Behavioral task
behavioral1
Sample
41347ab5d177516699a95664c9af347f.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
41347ab5d177516699a95664c9af347f.exe
Resource
win10-en-20210920
General
-
Target
41347ab5d177516699a95664c9af347f.exe
-
Size
83KB
-
MD5
41347ab5d177516699a95664c9af347f
-
SHA1
ed91314e9da6cbb4564b94e2abc151f29daa9f69
-
SHA256
67d0b08c6cf36abee6b895c90773663a21131e4bc36ff46726e8ba9a53ed0497
-
SHA512
247fea690c2d0a8e4a6b35dba8f06c8dc21f6bcd0277aeb2e26ca8140e53855a51d089887096d237fc2d8a4b038b07e24b78b539b6d75902a48a44adc5a69488
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
efinancet.shop - Port:
587 - Username:
[email protected] - Password:
SU^QlsaPg%E#
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
41347ab5d177516699a95664c9af347f.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 41347ab5d177516699a95664c9af347f.exe Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 41347ab5d177516699a95664c9af347f.exe Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 41347ab5d177516699a95664c9af347f.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 checkip.dyndns.org 13 freegeoip.app 14 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
41347ab5d177516699a95664c9af347f.exedescription pid process target process PID 1516 set thread context of 432 1516 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
41347ab5d177516699a95664c9af347f.exe41347ab5d177516699a95664c9af347f.exepid process 1516 41347ab5d177516699a95664c9af347f.exe 1516 41347ab5d177516699a95664c9af347f.exe 432 41347ab5d177516699a95664c9af347f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
41347ab5d177516699a95664c9af347f.exe41347ab5d177516699a95664c9af347f.exedescription pid process Token: SeDebugPrivilege 1516 41347ab5d177516699a95664c9af347f.exe Token: SeDebugPrivilege 432 41347ab5d177516699a95664c9af347f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
41347ab5d177516699a95664c9af347f.exedescription pid process target process PID 1516 wrote to memory of 432 1516 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe PID 1516 wrote to memory of 432 1516 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe PID 1516 wrote to memory of 432 1516 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe PID 1516 wrote to memory of 432 1516 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe PID 1516 wrote to memory of 432 1516 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe PID 1516 wrote to memory of 432 1516 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe PID 1516 wrote to memory of 432 1516 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe PID 1516 wrote to memory of 432 1516 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe PID 1516 wrote to memory of 432 1516 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe -
outlook_office_path 1 IoCs
Processes:
41347ab5d177516699a95664c9af347f.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 41347ab5d177516699a95664c9af347f.exe -
outlook_win_path 1 IoCs
Processes:
41347ab5d177516699a95664c9af347f.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 41347ab5d177516699a95664c9af347f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41347ab5d177516699a95664c9af347f.exe"C:\Users\Admin\AppData\Local\Temp\41347ab5d177516699a95664c9af347f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\41347ab5d177516699a95664c9af347f.exeC:\Users\Admin\AppData\Local\Temp\41347ab5d177516699a95664c9af347f.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:432