Analysis
-
max time kernel
120s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
20-10-2021 03:49
Static task
static1
Behavioral task
behavioral1
Sample
Listed Product.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Listed Product.exe
Resource
win10-en-20210920
General
-
Target
Listed Product.exe
-
Size
445KB
-
MD5
a0d71ca643ab39c23b18e2f45282a9a4
-
SHA1
3378802a61cce072963789f8e79cbf3118d9443b
-
SHA256
44ebf617496d7c7d6fdae0dcdac3d1964cd28af093dd19c3e6b897af83b3d9ea
-
SHA512
b59717c45eef4015e6cc04c6651da1f69baad79feed2a473af13717f5dd2ae459e50d27ce25d325d4233a5f6a7b27926f485e69d37b2bd7d79a704f6fdf19d45
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1620445910:AAF2v81NoINJsu_XXnpGet1YDm-NxnznaIE/sendMessage?chat_id=1063661839
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Listed Product.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Listed Product.exe Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Listed Product.exe Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Listed Product.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 checkip.dyndns.org 8 freegeoip.app 9 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Listed Product.exedescription pid process target process PID 1500 set thread context of 652 1500 Listed Product.exe Listed Product.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Listed Product.exepid process 652 Listed Product.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Listed Product.exedescription pid process Token: SeDebugPrivilege 652 Listed Product.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Listed Product.exeListed Product.exedescription pid process target process PID 1500 wrote to memory of 652 1500 Listed Product.exe Listed Product.exe PID 1500 wrote to memory of 652 1500 Listed Product.exe Listed Product.exe PID 1500 wrote to memory of 652 1500 Listed Product.exe Listed Product.exe PID 1500 wrote to memory of 652 1500 Listed Product.exe Listed Product.exe PID 1500 wrote to memory of 652 1500 Listed Product.exe Listed Product.exe PID 1500 wrote to memory of 652 1500 Listed Product.exe Listed Product.exe PID 1500 wrote to memory of 652 1500 Listed Product.exe Listed Product.exe PID 1500 wrote to memory of 652 1500 Listed Product.exe Listed Product.exe PID 1500 wrote to memory of 652 1500 Listed Product.exe Listed Product.exe PID 652 wrote to memory of 1068 652 Listed Product.exe REG.exe PID 652 wrote to memory of 1068 652 Listed Product.exe REG.exe PID 652 wrote to memory of 1068 652 Listed Product.exe REG.exe PID 652 wrote to memory of 1068 652 Listed Product.exe REG.exe -
outlook_office_path 1 IoCs
Processes:
Listed Product.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Listed Product.exe -
outlook_win_path 1 IoCs
Processes:
Listed Product.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Listed Product.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Listed Product.exe"C:\Users\Admin\AppData\Local\Temp\Listed Product.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\Listed Product.exe"C:\Users\Admin\AppData\Local\Temp\Listed Product.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:652 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:1068
-
-