Analysis
-
max time kernel
81s -
max time network
129s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
18-10-2021 16:30
Static task
static1
Behavioral task
behavioral1
Sample
41347ab5d177516699a95664c9af347f.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
41347ab5d177516699a95664c9af347f.exe
Resource
win10-en-20210920
General
-
Target
41347ab5d177516699a95664c9af347f.exe
-
Size
83KB
-
MD5
41347ab5d177516699a95664c9af347f
-
SHA1
ed91314e9da6cbb4564b94e2abc151f29daa9f69
-
SHA256
67d0b08c6cf36abee6b895c90773663a21131e4bc36ff46726e8ba9a53ed0497
-
SHA512
247fea690c2d0a8e4a6b35dba8f06c8dc21f6bcd0277aeb2e26ca8140e53855a51d089887096d237fc2d8a4b038b07e24b78b539b6d75902a48a44adc5a69488
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
efinancet.shop - Port:
587 - Username:
[email protected] - Password:
SU^QlsaPg%E#
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
41347ab5d177516699a95664c9af347f.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 41347ab5d177516699a95664c9af347f.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 41347ab5d177516699a95664c9af347f.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 41347ab5d177516699a95664c9af347f.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 26 checkip.dyndns.org 28 freegeoip.app 29 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
41347ab5d177516699a95664c9af347f.exedescription pid process target process PID 2492 set thread context of 3028 2492 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
41347ab5d177516699a95664c9af347f.exe41347ab5d177516699a95664c9af347f.exepid process 2492 41347ab5d177516699a95664c9af347f.exe 2492 41347ab5d177516699a95664c9af347f.exe 3028 41347ab5d177516699a95664c9af347f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
41347ab5d177516699a95664c9af347f.exe41347ab5d177516699a95664c9af347f.exedescription pid process Token: SeDebugPrivilege 2492 41347ab5d177516699a95664c9af347f.exe Token: SeDebugPrivilege 3028 41347ab5d177516699a95664c9af347f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
41347ab5d177516699a95664c9af347f.exedescription pid process target process PID 2492 wrote to memory of 3028 2492 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe PID 2492 wrote to memory of 3028 2492 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe PID 2492 wrote to memory of 3028 2492 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe PID 2492 wrote to memory of 3028 2492 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe PID 2492 wrote to memory of 3028 2492 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe PID 2492 wrote to memory of 3028 2492 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe PID 2492 wrote to memory of 3028 2492 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe PID 2492 wrote to memory of 3028 2492 41347ab5d177516699a95664c9af347f.exe 41347ab5d177516699a95664c9af347f.exe -
outlook_office_path 1 IoCs
Processes:
41347ab5d177516699a95664c9af347f.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 41347ab5d177516699a95664c9af347f.exe -
outlook_win_path 1 IoCs
Processes:
41347ab5d177516699a95664c9af347f.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 41347ab5d177516699a95664c9af347f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41347ab5d177516699a95664c9af347f.exe"C:\Users\Admin\AppData\Local\Temp\41347ab5d177516699a95664c9af347f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\41347ab5d177516699a95664c9af347f.exeC:\Users\Admin\AppData\Local\Temp\41347ab5d177516699a95664c9af347f.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\41347ab5d177516699a95664c9af347f.exe.log
MD5808e884c00533a9eb0e13e64960d9c3a
SHA1279d05181fc6179a12df1a669ff5d8b64c1380ae
SHA2562f6a0aab99b1c228a6642f44f8992646ce84c5a2b3b9941b6cf1f2badf67bdd6
SHA5129489bdb2ffdfeef3c52edcfe9b34c6688eba53eb86075e0564df1cd474723c86b5b5aedc12df1ff5fc12cf97bd1e3cf9701ff61dc4ce90155d70e9ccfd0fc299