Analysis
-
max time kernel
120s -
max time network
138s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
20-10-2021 06:24
Static task
static1
Behavioral task
behavioral1
Sample
83c11e7d4fcf13515fc5be9938dd75be.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
83c11e7d4fcf13515fc5be9938dd75be.exe
Resource
win10-en-20210920
General
-
Target
83c11e7d4fcf13515fc5be9938dd75be.exe
-
Size
641KB
-
MD5
83c11e7d4fcf13515fc5be9938dd75be
-
SHA1
5b1267583abf7803a20aa63bc9739894ee567c31
-
SHA256
df9ce9ef0fe2c633c368b9859f6f88672b5be6867c52ad54d6b7ab42081893fd
-
SHA512
6b07e7e369554e6bbe036263ef93fe2019606d8ac68049bc44b03dbcaccc5e4f47975fc59d5d54a9fde6bfced9e51f44340de1c8bc3e92f6cbbf84c99fb5f2b2
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
budgetn.shop - Port:
587 - Username:
[email protected] - Password:
rSJ9l_d%#+1Z
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 checkip.dyndns.org 14 freegeoip.app 15 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
83c11e7d4fcf13515fc5be9938dd75be.exedescription pid process target process PID 3464 set thread context of 4472 3464 83c11e7d4fcf13515fc5be9938dd75be.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4000 3464 WerFault.exe 83c11e7d4fcf13515fc5be9938dd75be.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
vbc.exeWerFault.exepid process 4472 vbc.exe 4000 WerFault.exe 4000 WerFault.exe 4000 WerFault.exe 4000 WerFault.exe 4000 WerFault.exe 4000 WerFault.exe 4000 WerFault.exe 4000 WerFault.exe 4000 WerFault.exe 4000 WerFault.exe 4000 WerFault.exe 4000 WerFault.exe 4000 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
83c11e7d4fcf13515fc5be9938dd75be.exevbc.exeWerFault.exedescription pid process Token: SeDebugPrivilege 3464 83c11e7d4fcf13515fc5be9938dd75be.exe Token: SeDebugPrivilege 4472 vbc.exe Token: SeRestorePrivilege 4000 WerFault.exe Token: SeBackupPrivilege 4000 WerFault.exe Token: SeDebugPrivilege 4000 WerFault.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
83c11e7d4fcf13515fc5be9938dd75be.exedescription pid process target process PID 3464 wrote to memory of 4472 3464 83c11e7d4fcf13515fc5be9938dd75be.exe vbc.exe PID 3464 wrote to memory of 4472 3464 83c11e7d4fcf13515fc5be9938dd75be.exe vbc.exe PID 3464 wrote to memory of 4472 3464 83c11e7d4fcf13515fc5be9938dd75be.exe vbc.exe PID 3464 wrote to memory of 4472 3464 83c11e7d4fcf13515fc5be9938dd75be.exe vbc.exe PID 3464 wrote to memory of 4472 3464 83c11e7d4fcf13515fc5be9938dd75be.exe vbc.exe PID 3464 wrote to memory of 4472 3464 83c11e7d4fcf13515fc5be9938dd75be.exe vbc.exe PID 3464 wrote to memory of 4472 3464 83c11e7d4fcf13515fc5be9938dd75be.exe vbc.exe PID 3464 wrote to memory of 4472 3464 83c11e7d4fcf13515fc5be9938dd75be.exe vbc.exe -
outlook_office_path 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe -
outlook_win_path 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\83c11e7d4fcf13515fc5be9938dd75be.exe"C:\Users\Admin\AppData\Local\Temp\83c11e7d4fcf13515fc5be9938dd75be.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 13002⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000
-