Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
19-10-2021 11:56
Static task
static1
Behavioral task
behavioral1
Sample
dbc86fb7bb8ff78aa755b835af1cea43.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
dbc86fb7bb8ff78aa755b835af1cea43.exe
Resource
win10-en-20211014
General
-
Target
dbc86fb7bb8ff78aa755b835af1cea43.exe
-
Size
76KB
-
MD5
dbc86fb7bb8ff78aa755b835af1cea43
-
SHA1
ef3dded98b53181472f2f76bd56640e78441c094
-
SHA256
8194267924b10c3df2ea10dc1d56f9365effe18125b9197dfcc720db3e3e5f48
-
SHA512
ebd831c6e12253f18a7989590cdd31280d8da4699a2fb840a3dcca3bcb65e3152a14684ed7bff33e0a6e708553420917a289b720091d60322d81408e917eebb6
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
efinancet.shop - Port:
587 - Username:
[email protected] - Password:
Pu;wC&nm^2+H
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
dbc86fb7bb8ff78aa755b835af1cea43.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dbc86fb7bb8ff78aa755b835af1cea43.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dbc86fb7bb8ff78aa755b835af1cea43.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dbc86fb7bb8ff78aa755b835af1cea43.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 30 checkip.dyndns.org 33 freegeoip.app 34 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
dbc86fb7bb8ff78aa755b835af1cea43.exedescription pid process target process PID 4144 set thread context of 1212 4144 dbc86fb7bb8ff78aa755b835af1cea43.exe dbc86fb7bb8ff78aa755b835af1cea43.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
dbc86fb7bb8ff78aa755b835af1cea43.exedbc86fb7bb8ff78aa755b835af1cea43.exepid process 4144 dbc86fb7bb8ff78aa755b835af1cea43.exe 4144 dbc86fb7bb8ff78aa755b835af1cea43.exe 1212 dbc86fb7bb8ff78aa755b835af1cea43.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
dbc86fb7bb8ff78aa755b835af1cea43.exedbc86fb7bb8ff78aa755b835af1cea43.exedescription pid process Token: SeDebugPrivilege 4144 dbc86fb7bb8ff78aa755b835af1cea43.exe Token: SeDebugPrivilege 1212 dbc86fb7bb8ff78aa755b835af1cea43.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
dbc86fb7bb8ff78aa755b835af1cea43.exedescription pid process target process PID 4144 wrote to memory of 1212 4144 dbc86fb7bb8ff78aa755b835af1cea43.exe dbc86fb7bb8ff78aa755b835af1cea43.exe PID 4144 wrote to memory of 1212 4144 dbc86fb7bb8ff78aa755b835af1cea43.exe dbc86fb7bb8ff78aa755b835af1cea43.exe PID 4144 wrote to memory of 1212 4144 dbc86fb7bb8ff78aa755b835af1cea43.exe dbc86fb7bb8ff78aa755b835af1cea43.exe PID 4144 wrote to memory of 1212 4144 dbc86fb7bb8ff78aa755b835af1cea43.exe dbc86fb7bb8ff78aa755b835af1cea43.exe PID 4144 wrote to memory of 1212 4144 dbc86fb7bb8ff78aa755b835af1cea43.exe dbc86fb7bb8ff78aa755b835af1cea43.exe PID 4144 wrote to memory of 1212 4144 dbc86fb7bb8ff78aa755b835af1cea43.exe dbc86fb7bb8ff78aa755b835af1cea43.exe PID 4144 wrote to memory of 1212 4144 dbc86fb7bb8ff78aa755b835af1cea43.exe dbc86fb7bb8ff78aa755b835af1cea43.exe PID 4144 wrote to memory of 1212 4144 dbc86fb7bb8ff78aa755b835af1cea43.exe dbc86fb7bb8ff78aa755b835af1cea43.exe -
outlook_office_path 1 IoCs
Processes:
dbc86fb7bb8ff78aa755b835af1cea43.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dbc86fb7bb8ff78aa755b835af1cea43.exe -
outlook_win_path 1 IoCs
Processes:
dbc86fb7bb8ff78aa755b835af1cea43.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dbc86fb7bb8ff78aa755b835af1cea43.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbc86fb7bb8ff78aa755b835af1cea43.exe"C:\Users\Admin\AppData\Local\Temp\dbc86fb7bb8ff78aa755b835af1cea43.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\dbc86fb7bb8ff78aa755b835af1cea43.exeC:\Users\Admin\AppData\Local\Temp\dbc86fb7bb8ff78aa755b835af1cea43.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1212
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dbc86fb7bb8ff78aa755b835af1cea43.exe.log
MD5808e884c00533a9eb0e13e64960d9c3a
SHA1279d05181fc6179a12df1a669ff5d8b64c1380ae
SHA2562f6a0aab99b1c228a6642f44f8992646ce84c5a2b3b9941b6cf1f2badf67bdd6
SHA5129489bdb2ffdfeef3c52edcfe9b34c6688eba53eb86075e0564df1cd474723c86b5b5aedc12df1ff5fc12cf97bd1e3cf9701ff61dc4ce90155d70e9ccfd0fc299