Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 06:17
Static task
static1
Behavioral task
behavioral1
Sample
Required Order Details 00102.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Required Order Details 00102.exe
Resource
win10v2004-20220414-en
General
-
Target
Required Order Details 00102.exe
-
Size
1.0MB
-
MD5
6d0179f9aa38d8a3e647515c7877e0cf
-
SHA1
a6d06468daa02b19af4e6cfcd42faa2da8758539
-
SHA256
fe29566569ad2dc80058ea8eb409b1e43a108edbb92226981d63fbfb3723dbcd
-
SHA512
ba7fdce604ba075f1c476107febddee83f6a0b6334a026e9a8b08fe85e07dce8ab542a301f079b20667ea8f547229768cc1fb5fa3f683c1b5847837ee1c1caff
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5341595415:AAEt7OD2QzYeRUAXd4WcbTK7h3cIsSPV_BU/sendMessage?chat_id=1287398990
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2808-135-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Required Order Details 00102.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Required Order Details 00102.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Required Order Details 00102.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Required Order Details 00102.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Required Order Details 00102.exedescription pid process target process PID 2360 set thread context of 2808 2360 Required Order Details 00102.exe Required Order Details 00102.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
Required Order Details 00102.exeRequired Order Details 00102.exepid process 2360 Required Order Details 00102.exe 2360 Required Order Details 00102.exe 2360 Required Order Details 00102.exe 2360 Required Order Details 00102.exe 2360 Required Order Details 00102.exe 2360 Required Order Details 00102.exe 2360 Required Order Details 00102.exe 2360 Required Order Details 00102.exe 2808 Required Order Details 00102.exe 2360 Required Order Details 00102.exe 2360 Required Order Details 00102.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Required Order Details 00102.exeRequired Order Details 00102.exedescription pid process Token: SeDebugPrivilege 2360 Required Order Details 00102.exe Token: SeDebugPrivilege 2808 Required Order Details 00102.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Required Order Details 00102.exedescription pid process target process PID 2360 wrote to memory of 2808 2360 Required Order Details 00102.exe Required Order Details 00102.exe PID 2360 wrote to memory of 2808 2360 Required Order Details 00102.exe Required Order Details 00102.exe PID 2360 wrote to memory of 2808 2360 Required Order Details 00102.exe Required Order Details 00102.exe PID 2360 wrote to memory of 2808 2360 Required Order Details 00102.exe Required Order Details 00102.exe PID 2360 wrote to memory of 2808 2360 Required Order Details 00102.exe Required Order Details 00102.exe PID 2360 wrote to memory of 2808 2360 Required Order Details 00102.exe Required Order Details 00102.exe PID 2360 wrote to memory of 2808 2360 Required Order Details 00102.exe Required Order Details 00102.exe PID 2360 wrote to memory of 2808 2360 Required Order Details 00102.exe Required Order Details 00102.exe -
outlook_office_path 1 IoCs
Processes:
Required Order Details 00102.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Required Order Details 00102.exe -
outlook_win_path 1 IoCs
Processes:
Required Order Details 00102.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Required Order Details 00102.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Required Order Details 00102.exe"C:\Users\Admin\AppData\Local\Temp\Required Order Details 00102.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\Required Order Details 00102.exe"C:\Users\Admin\AppData\Local\Temp\Required Order Details 00102.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2808
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:4792