Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
19-10-2021 15:10
Static task
static1
Behavioral task
behavioral1
Sample
doc 2021101900001001098890010.PDF.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
doc 2021101900001001098890010.PDF.exe
Resource
win10-en-20210920
General
-
Target
doc 2021101900001001098890010.PDF.exe
-
Size
72KB
-
MD5
cb4509447504ad2c20c7187094e95aec
-
SHA1
2ddc065a753e5ad73c37ad4b2d9dc9d3845fdb9a
-
SHA256
fe1679d76c689387b5af6885afe9c43521fdedd1511028a146064a69be59f7e9
-
SHA512
1518d4c0b1a33e1925995e091d86bdd7293ec65cef562c143c06be60c4948e1d7cacfabb9f7fb83f61af87f3071bbdf52a95644e874d2ab798911acf4ead3485
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.enmmakina.com.tr - Port:
587 - Username:
[email protected] - Password:
WG7sfIIm5
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
doc 2021101900001001098890010.PDF.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 doc 2021101900001001098890010.PDF.exe Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 doc 2021101900001001098890010.PDF.exe Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 doc 2021101900001001098890010.PDF.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 checkip.dyndns.org 12 freegeoip.app 13 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
Processes:
doc 2021101900001001098890010.PDF.exepid process 964 doc 2021101900001001098890010.PDF.exe 964 doc 2021101900001001098890010.PDF.exe 964 doc 2021101900001001098890010.PDF.exe 964 doc 2021101900001001098890010.PDF.exe 964 doc 2021101900001001098890010.PDF.exe 964 doc 2021101900001001098890010.PDF.exe 964 doc 2021101900001001098890010.PDF.exe 964 doc 2021101900001001098890010.PDF.exe 964 doc 2021101900001001098890010.PDF.exe 964 doc 2021101900001001098890010.PDF.exe 964 doc 2021101900001001098890010.PDF.exe 964 doc 2021101900001001098890010.PDF.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
doc 2021101900001001098890010.PDF.exedescription pid process target process PID 964 set thread context of 572 964 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1744 964 WerFault.exe doc 2021101900001001098890010.PDF.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
doc 2021101900001001098890010.PDF.exedoc 2021101900001001098890010.PDF.exeWerFault.exepid process 964 doc 2021101900001001098890010.PDF.exe 964 doc 2021101900001001098890010.PDF.exe 964 doc 2021101900001001098890010.PDF.exe 572 doc 2021101900001001098890010.PDF.exe 1744 WerFault.exe 1744 WerFault.exe 1744 WerFault.exe 1744 WerFault.exe 1744 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 1744 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
doc 2021101900001001098890010.PDF.exedoc 2021101900001001098890010.PDF.exeWerFault.exedescription pid process Token: SeDebugPrivilege 964 doc 2021101900001001098890010.PDF.exe Token: SeDebugPrivilege 572 doc 2021101900001001098890010.PDF.exe Token: SeDebugPrivilege 1744 WerFault.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
doc 2021101900001001098890010.PDF.exedescription pid process target process PID 964 wrote to memory of 888 964 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 964 wrote to memory of 888 964 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 964 wrote to memory of 888 964 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 964 wrote to memory of 888 964 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 964 wrote to memory of 572 964 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 964 wrote to memory of 572 964 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 964 wrote to memory of 572 964 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 964 wrote to memory of 572 964 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 964 wrote to memory of 572 964 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 964 wrote to memory of 572 964 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 964 wrote to memory of 572 964 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 964 wrote to memory of 572 964 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 964 wrote to memory of 572 964 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 964 wrote to memory of 1744 964 doc 2021101900001001098890010.PDF.exe WerFault.exe PID 964 wrote to memory of 1744 964 doc 2021101900001001098890010.PDF.exe WerFault.exe PID 964 wrote to memory of 1744 964 doc 2021101900001001098890010.PDF.exe WerFault.exe PID 964 wrote to memory of 1744 964 doc 2021101900001001098890010.PDF.exe WerFault.exe -
outlook_office_path 1 IoCs
Processes:
doc 2021101900001001098890010.PDF.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 doc 2021101900001001098890010.PDF.exe -
outlook_win_path 1 IoCs
Processes:
doc 2021101900001001098890010.PDF.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 doc 2021101900001001098890010.PDF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\doc 2021101900001001098890010.PDF.exe"C:\Users\Admin\AppData\Local\Temp\doc 2021101900001001098890010.PDF.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\doc 2021101900001001098890010.PDF.exe"C:\Users\Admin\AppData\Local\Temp\doc 2021101900001001098890010.PDF.exe"2⤵PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\doc 2021101900001001098890010.PDF.exe"C:\Users\Admin\AppData\Local\Temp\doc 2021101900001001098890010.PDF.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 15282⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1744
-