Analysis

  • max time kernel
    122s
  • max time network
    137s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    05-12-2021 07:27

General

  • Target

    a72f3d7698f6126013cff4e4ad1fb808.exe

  • Size

    1.7MB

  • MD5

    a72f3d7698f6126013cff4e4ad1fb808

  • SHA1

    cd44ae59eb8ae4111c53e8b4a3da5e7ba1af48bb

  • SHA256

    71ae3e49cd3e22ac2de6cc53dd6b662d8f65d8f4d9f4e882e1b88d3cff18e18c

  • SHA512

    1c23c290cc4ce5876a7f86677da352e9229c387f03ef504a6287978001bb228b85aea46eb4493f886a1602691fa2b85cca3addf5c487a303ac590ab454db501b

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.nclanka.lk
  • Port:
    587
  • Username:
    sales@nclanka.lk
  • Password:
    OgNl@$200

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.nclanka.lk
  • Port:
    587
  • Username:
    sales@nclanka.lk
  • Password:
    OgNl@$200

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a72f3d7698f6126013cff4e4ad1fb808.exe
    "C:\Users\Admin\AppData\Local\Temp\a72f3d7698f6126013cff4e4ad1fb808.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Users\Admin\AppData\Local\Temp\a72f3d7698f6126013cff4e4ad1fb808.exe
      "C:\Users\Admin\AppData\Local\Temp\a72f3d7698f6126013cff4e4ad1fb808.exe"
      2⤵
        PID:4068
      • C:\Users\Admin\AppData\Local\Temp\a72f3d7698f6126013cff4e4ad1fb808.exe
        "C:\Users\Admin\AppData\Local\Temp\a72f3d7698f6126013cff4e4ad1fb808.exe"
        2⤵
        • Checks computer location settings
        • Adds Run key to start application
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3880
        • C:\Users\Admin\AppData\Local\Temp\._cache_a72f3d7698f6126013cff4e4ad1fb808.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_a72f3d7698f6126013cff4e4ad1fb808.exe"
          3⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1828
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:396
          • C:\ProgramData\Synaptics\Synaptics.exe
            "C:\ProgramData\Synaptics\Synaptics.exe"
            4⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1652
            • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
              "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"
              5⤵
              • Executes dropped EXE
              • Accesses Microsoft Outlook profiles
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • outlook_office_path
              • outlook_win_path
              PID:3868

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    3
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Synaptics\Synaptics.exe
      MD5

      a72f3d7698f6126013cff4e4ad1fb808

      SHA1

      cd44ae59eb8ae4111c53e8b4a3da5e7ba1af48bb

      SHA256

      71ae3e49cd3e22ac2de6cc53dd6b662d8f65d8f4d9f4e882e1b88d3cff18e18c

      SHA512

      1c23c290cc4ce5876a7f86677da352e9229c387f03ef504a6287978001bb228b85aea46eb4493f886a1602691fa2b85cca3addf5c487a303ac590ab454db501b

    • C:\ProgramData\Synaptics\Synaptics.exe
      MD5

      a72f3d7698f6126013cff4e4ad1fb808

      SHA1

      cd44ae59eb8ae4111c53e8b4a3da5e7ba1af48bb

      SHA256

      71ae3e49cd3e22ac2de6cc53dd6b662d8f65d8f4d9f4e882e1b88d3cff18e18c

      SHA512

      1c23c290cc4ce5876a7f86677da352e9229c387f03ef504a6287978001bb228b85aea46eb4493f886a1602691fa2b85cca3addf5c487a303ac590ab454db501b

    • C:\ProgramData\Synaptics\Synaptics.exe
      MD5

      a72f3d7698f6126013cff4e4ad1fb808

      SHA1

      cd44ae59eb8ae4111c53e8b4a3da5e7ba1af48bb

      SHA256

      71ae3e49cd3e22ac2de6cc53dd6b662d8f65d8f4d9f4e882e1b88d3cff18e18c

      SHA512

      1c23c290cc4ce5876a7f86677da352e9229c387f03ef504a6287978001bb228b85aea46eb4493f886a1602691fa2b85cca3addf5c487a303ac590ab454db501b

    • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
      MD5

      ba9fe00d326f5997104101d59460e994

      SHA1

      46acc8f6c5f441f594d38e7062d63abfd2286807

      SHA256

      6e9e6f46101684f027120ad7ad467587899924d49387c7feab1f792342575e4b

      SHA512

      69009b4b6adbfa6e4eb5ed21486ab78ab706b8a6ba02628319df5c4ac6913e495655bdd552ac4fc4dc5cd7ac6bccb73b86e0f531badfe43f65acde466323687d

    • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
      MD5

      ba9fe00d326f5997104101d59460e994

      SHA1

      46acc8f6c5f441f594d38e7062d63abfd2286807

      SHA256

      6e9e6f46101684f027120ad7ad467587899924d49387c7feab1f792342575e4b

      SHA512

      69009b4b6adbfa6e4eb5ed21486ab78ab706b8a6ba02628319df5c4ac6913e495655bdd552ac4fc4dc5cd7ac6bccb73b86e0f531badfe43f65acde466323687d

    • C:\Users\Admin\AppData\Local\Temp\._cache_a72f3d7698f6126013cff4e4ad1fb808.exe
      MD5

      ba9fe00d326f5997104101d59460e994

      SHA1

      46acc8f6c5f441f594d38e7062d63abfd2286807

      SHA256

      6e9e6f46101684f027120ad7ad467587899924d49387c7feab1f792342575e4b

      SHA512

      69009b4b6adbfa6e4eb5ed21486ab78ab706b8a6ba02628319df5c4ac6913e495655bdd552ac4fc4dc5cd7ac6bccb73b86e0f531badfe43f65acde466323687d

    • C:\Users\Admin\AppData\Local\Temp\._cache_a72f3d7698f6126013cff4e4ad1fb808.exe
      MD5

      ba9fe00d326f5997104101d59460e994

      SHA1

      46acc8f6c5f441f594d38e7062d63abfd2286807

      SHA256

      6e9e6f46101684f027120ad7ad467587899924d49387c7feab1f792342575e4b

      SHA512

      69009b4b6adbfa6e4eb5ed21486ab78ab706b8a6ba02628319df5c4ac6913e495655bdd552ac4fc4dc5cd7ac6bccb73b86e0f531badfe43f65acde466323687d

    • memory/396-147-0x0000000005150000-0x000000000564E000-memory.dmp
      Filesize

      5.0MB

    • memory/396-136-0x0000000000000000-mapping.dmp
    • memory/1652-157-0x00000000013D0000-0x00000000013D1000-memory.dmp
      Filesize

      4KB

    • memory/1652-156-0x0000000000400000-0x00000000004E1000-memory.dmp
      Filesize

      900KB

    • memory/1652-154-0x000000000049AB80-mapping.dmp
    • memory/1828-129-0x0000000000000000-mapping.dmp
    • memory/1828-148-0x00000000065D0000-0x00000000065D1000-memory.dmp
      Filesize

      4KB

    • memory/1828-146-0x0000000005200000-0x00000000056FE000-memory.dmp
      Filesize

      5.0MB

    • memory/1828-132-0x0000000000A10000-0x0000000000A11000-memory.dmp
      Filesize

      4KB

    • memory/2816-122-0x00000000086A0000-0x00000000086A1000-memory.dmp
      Filesize

      4KB

    • memory/2816-124-0x000000000B500000-0x000000000B60F000-memory.dmp
      Filesize

      1.1MB

    • memory/2816-121-0x00000000055D0000-0x00000000055E6000-memory.dmp
      Filesize

      88KB

    • memory/2816-120-0x0000000005070000-0x0000000005071000-memory.dmp
      Filesize

      4KB

    • memory/2816-123-0x0000000008C80000-0x0000000008D85000-memory.dmp
      Filesize

      1.0MB

    • memory/2816-115-0x0000000000660000-0x0000000000661000-memory.dmp
      Filesize

      4KB

    • memory/2816-119-0x0000000004FE0000-0x0000000005072000-memory.dmp
      Filesize

      584KB

    • memory/2816-117-0x0000000005630000-0x0000000005631000-memory.dmp
      Filesize

      4KB

    • memory/2816-118-0x0000000005080000-0x0000000005081000-memory.dmp
      Filesize

      4KB

    • memory/3868-158-0x0000000000000000-mapping.dmp
    • memory/3868-165-0x00000000050F0000-0x00000000055EE000-memory.dmp
      Filesize

      5.0MB

    • memory/3880-127-0x0000000000400000-0x00000000004E1000-memory.dmp
      Filesize

      900KB

    • memory/3880-125-0x0000000000400000-0x00000000004E1000-memory.dmp
      Filesize

      900KB

    • memory/3880-126-0x000000000049AB80-mapping.dmp
    • memory/3880-128-0x0000000000E30000-0x0000000000E31000-memory.dmp
      Filesize

      4KB