Analysis
-
max time kernel
103s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
19-10-2021 15:10
Static task
static1
Behavioral task
behavioral1
Sample
doc 2021101900001001098890010.PDF.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
doc 2021101900001001098890010.PDF.exe
Resource
win10-en-20210920
General
-
Target
doc 2021101900001001098890010.PDF.exe
-
Size
72KB
-
MD5
cb4509447504ad2c20c7187094e95aec
-
SHA1
2ddc065a753e5ad73c37ad4b2d9dc9d3845fdb9a
-
SHA256
fe1679d76c689387b5af6885afe9c43521fdedd1511028a146064a69be59f7e9
-
SHA512
1518d4c0b1a33e1925995e091d86bdd7293ec65cef562c143c06be60c4948e1d7cacfabb9f7fb83f61af87f3071bbdf52a95644e874d2ab798911acf4ead3485
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.enmmakina.com.tr - Port:
587 - Username:
[email protected] - Password:
WG7sfIIm5
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
doc 2021101900001001098890010.PDF.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 doc 2021101900001001098890010.PDF.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 doc 2021101900001001098890010.PDF.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 doc 2021101900001001098890010.PDF.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 checkip.dyndns.org 13 freegeoip.app 14 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
Processes:
doc 2021101900001001098890010.PDF.exepid process 3800 doc 2021101900001001098890010.PDF.exe 3800 doc 2021101900001001098890010.PDF.exe 3800 doc 2021101900001001098890010.PDF.exe 3800 doc 2021101900001001098890010.PDF.exe 3800 doc 2021101900001001098890010.PDF.exe 3800 doc 2021101900001001098890010.PDF.exe 3800 doc 2021101900001001098890010.PDF.exe 3800 doc 2021101900001001098890010.PDF.exe 3800 doc 2021101900001001098890010.PDF.exe 3800 doc 2021101900001001098890010.PDF.exe 3800 doc 2021101900001001098890010.PDF.exe 3800 doc 2021101900001001098890010.PDF.exe 3800 doc 2021101900001001098890010.PDF.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
doc 2021101900001001098890010.PDF.exedescription pid process target process PID 3800 set thread context of 1840 3800 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
doc 2021101900001001098890010.PDF.exedoc 2021101900001001098890010.PDF.exepid process 3800 doc 2021101900001001098890010.PDF.exe 3800 doc 2021101900001001098890010.PDF.exe 3800 doc 2021101900001001098890010.PDF.exe 1840 doc 2021101900001001098890010.PDF.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
doc 2021101900001001098890010.PDF.exedoc 2021101900001001098890010.PDF.exedescription pid process Token: SeDebugPrivilege 3800 doc 2021101900001001098890010.PDF.exe Token: SeDebugPrivilege 1840 doc 2021101900001001098890010.PDF.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
doc 2021101900001001098890010.PDF.exedescription pid process target process PID 3800 wrote to memory of 1840 3800 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 3800 wrote to memory of 1840 3800 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 3800 wrote to memory of 1840 3800 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 3800 wrote to memory of 1840 3800 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 3800 wrote to memory of 1840 3800 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 3800 wrote to memory of 1840 3800 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 3800 wrote to memory of 1840 3800 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe PID 3800 wrote to memory of 1840 3800 doc 2021101900001001098890010.PDF.exe doc 2021101900001001098890010.PDF.exe -
outlook_office_path 1 IoCs
Processes:
doc 2021101900001001098890010.PDF.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 doc 2021101900001001098890010.PDF.exe -
outlook_win_path 1 IoCs
Processes:
doc 2021101900001001098890010.PDF.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 doc 2021101900001001098890010.PDF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\doc 2021101900001001098890010.PDF.exe"C:\Users\Admin\AppData\Local\Temp\doc 2021101900001001098890010.PDF.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\doc 2021101900001001098890010.PDF.exe"C:\Users\Admin\AppData\Local\Temp\doc 2021101900001001098890010.PDF.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1840
-