Analysis

  • max time kernel
    94s
  • max time network
    98s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 22:14

General

  • Target

    PO#120111.exe

  • Size

    705KB

  • MD5

    308d21fc3085301ae679fdc305be6a7a

  • SHA1

    10e700444d2ca58f75681953bb1a1bbb59dfb498

  • SHA256

    c2186fd9dedfc7f90be64b895c2ce0ce93ae347b99de534bfc9570f9f9ad80e7

  • SHA512

    984cdecca9c6dbeafa319029242ae9d5a08ce1bb38e8e612580ff96c1cd069159dc624335b33999a8e55b84e4027c7e1e96f50db4b4d90938303409f97816d45

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger Payload 7 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO#120111.exe
    "C:\Users\Admin\AppData\Local\Temp\PO#120111.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Users\Admin\AppData\Local\Temp\PO#120111.exe
      "C:\Users\Admin\AppData\Local\Temp\PO#120111.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1944
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 1624
        3⤵
        • Program crash
        PID:1548

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/384-54-0x0000000000FF0000-0x00000000010A6000-memory.dmp

    Filesize

    728KB

  • memory/384-55-0x00000000763E1000-0x00000000763E3000-memory.dmp

    Filesize

    8KB

  • memory/384-56-0x00000000003C0000-0x00000000003CE000-memory.dmp

    Filesize

    56KB

  • memory/384-57-0x0000000007A30000-0x0000000007AB2000-memory.dmp

    Filesize

    520KB

  • memory/384-58-0x0000000000DA0000-0x0000000000DA6000-memory.dmp

    Filesize

    24KB

  • memory/384-59-0x0000000000DB0000-0x0000000000DD6000-memory.dmp

    Filesize

    152KB

  • memory/384-60-0x0000000000DF0000-0x0000000000E16000-memory.dmp

    Filesize

    152KB

  • memory/1548-74-0x0000000000000000-mapping.dmp

  • memory/1944-62-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1944-64-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1944-67-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1944-66-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1944-68-0x000000000042037E-mapping.dmp

  • memory/1944-70-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1944-72-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1944-61-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB