Analysis
-
max time kernel
114s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
22-05-2022 05:25
Static task
static1
Behavioral task
behavioral1
Sample
filezx.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
filezx.exe
Resource
win10v2004-20220414-en
General
-
Target
filezx.exe
-
Size
379KB
-
MD5
7e439c7f9636682598cb3438da45ebe9
-
SHA1
1033a94c129f60d5ef3915f0f8f1a9882eb4c845
-
SHA256
bfc94f0bd631a75dca96329c99631b3d7a6f6152974b091d280a8f77ddd88e15
-
SHA512
deebc13f38f464d6a3a660391cc70d30e774618c89604559354b393317b35eaae6b871718d86dd22d9a5efa5e9abc09fa9867aea740998fe7b985048a52c8cb9
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.twinarrow.com.my - Port:
587 - Username:
account@twinarrow.com.my - Password:
accountaccount123@ - Email To:
toniclinton33@gmail.com
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4492-175-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
filezx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation filezx.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
filezx.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 filezx.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 filezx.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 filezx.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 31 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
filezx.exedescription pid process target process PID 2204 set thread context of 4492 2204 filezx.exe filezx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 20 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 4732 timeout.exe 3684 timeout.exe 5080 timeout.exe 4460 timeout.exe 1864 timeout.exe 4824 timeout.exe 4592 timeout.exe 4456 timeout.exe 4868 timeout.exe 4260 timeout.exe 1640 timeout.exe 1080 timeout.exe 4928 timeout.exe 4364 timeout.exe 4160 timeout.exe 684 timeout.exe 1020 timeout.exe 1036 timeout.exe 2116 timeout.exe 3876 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
filezx.exefilezx.exepid process 2204 filezx.exe 2204 filezx.exe 4492 filezx.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
filezx.exefilezx.exedescription pid process Token: SeDebugPrivilege 2204 filezx.exe Token: SeDebugPrivilege 4492 filezx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
filezx.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2204 wrote to memory of 4336 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 4336 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 4336 2204 filezx.exe cmd.exe PID 4336 wrote to memory of 5080 4336 cmd.exe timeout.exe PID 4336 wrote to memory of 5080 4336 cmd.exe timeout.exe PID 4336 wrote to memory of 5080 4336 cmd.exe timeout.exe PID 2204 wrote to memory of 4272 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 4272 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 4272 2204 filezx.exe cmd.exe PID 4272 wrote to memory of 1020 4272 cmd.exe timeout.exe PID 4272 wrote to memory of 1020 4272 cmd.exe timeout.exe PID 4272 wrote to memory of 1020 4272 cmd.exe timeout.exe PID 2204 wrote to memory of 1708 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 1708 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 1708 2204 filezx.exe cmd.exe PID 1708 wrote to memory of 3876 1708 cmd.exe timeout.exe PID 1708 wrote to memory of 3876 1708 cmd.exe timeout.exe PID 1708 wrote to memory of 3876 1708 cmd.exe timeout.exe PID 2204 wrote to memory of 232 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 232 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 232 2204 filezx.exe cmd.exe PID 232 wrote to memory of 4928 232 cmd.exe timeout.exe PID 232 wrote to memory of 4928 232 cmd.exe timeout.exe PID 232 wrote to memory of 4928 232 cmd.exe timeout.exe PID 2204 wrote to memory of 1904 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 1904 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 1904 2204 filezx.exe cmd.exe PID 1904 wrote to memory of 4732 1904 cmd.exe timeout.exe PID 1904 wrote to memory of 4732 1904 cmd.exe timeout.exe PID 1904 wrote to memory of 4732 1904 cmd.exe timeout.exe PID 2204 wrote to memory of 916 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 916 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 916 2204 filezx.exe cmd.exe PID 916 wrote to memory of 1640 916 cmd.exe timeout.exe PID 916 wrote to memory of 1640 916 cmd.exe timeout.exe PID 916 wrote to memory of 1640 916 cmd.exe timeout.exe PID 2204 wrote to memory of 4836 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 4836 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 4836 2204 filezx.exe cmd.exe PID 4836 wrote to memory of 4460 4836 cmd.exe timeout.exe PID 4836 wrote to memory of 4460 4836 cmd.exe timeout.exe PID 4836 wrote to memory of 4460 4836 cmd.exe timeout.exe PID 2204 wrote to memory of 4884 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 4884 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 4884 2204 filezx.exe cmd.exe PID 4884 wrote to memory of 1864 4884 cmd.exe timeout.exe PID 4884 wrote to memory of 1864 4884 cmd.exe timeout.exe PID 4884 wrote to memory of 1864 4884 cmd.exe timeout.exe PID 2204 wrote to memory of 1528 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 1528 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 1528 2204 filezx.exe cmd.exe PID 1528 wrote to memory of 1036 1528 cmd.exe timeout.exe PID 1528 wrote to memory of 1036 1528 cmd.exe timeout.exe PID 1528 wrote to memory of 1036 1528 cmd.exe timeout.exe PID 2204 wrote to memory of 3956 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 3956 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 3956 2204 filezx.exe cmd.exe PID 3956 wrote to memory of 4824 3956 cmd.exe timeout.exe PID 3956 wrote to memory of 4824 3956 cmd.exe timeout.exe PID 3956 wrote to memory of 4824 3956 cmd.exe timeout.exe PID 2204 wrote to memory of 4040 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 4040 2204 filezx.exe cmd.exe PID 2204 wrote to memory of 4040 2204 filezx.exe cmd.exe PID 4040 wrote to memory of 4592 4040 cmd.exe timeout.exe -
outlook_office_path 1 IoCs
Processes:
filezx.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 filezx.exe -
outlook_win_path 1 IoCs
Processes:
filezx.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 filezx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\filezx.exe"C:\Users\Admin\AppData\Local\Temp\filezx.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 12⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\filezx.exeC:\Users\Admin\AppData\Local\Temp\filezx.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\filezx.exe.logFilesize
1KB
MD58fc84c8d72f995be269509b1bb98e2ef
SHA1082b7b872eb80137ef4e6e8060329a52c0730a00
SHA2566a611e8627f9d617f50ae50c2f1ae83b95afafe08aa22a65f9819a8b8be50e13
SHA512e249460805df0d1a7fa0a478e393fdda0b36a476ba1441be1d9ad8770f9bee64dbb365c503ad268d64e6db8657d35ba683ec24cbb66633d9f486088765287fb9
-
memory/8-161-0x0000000000000000-mapping.dmp
-
memory/216-167-0x0000000000000000-mapping.dmp
-
memory/232-137-0x0000000000000000-mapping.dmp
-
memory/684-166-0x0000000000000000-mapping.dmp
-
memory/916-141-0x0000000000000000-mapping.dmp
-
memory/1020-134-0x0000000000000000-mapping.dmp
-
memory/1036-148-0x0000000000000000-mapping.dmp
-
memory/1080-168-0x0000000000000000-mapping.dmp
-
memory/1528-147-0x0000000000000000-mapping.dmp
-
memory/1608-157-0x0000000000000000-mapping.dmp
-
memory/1640-142-0x0000000000000000-mapping.dmp
-
memory/1708-135-0x0000000000000000-mapping.dmp
-
memory/1864-146-0x0000000000000000-mapping.dmp
-
memory/1904-139-0x0000000000000000-mapping.dmp
-
memory/2116-160-0x0000000000000000-mapping.dmp
-
memory/2204-173-0x0000000007070000-0x00000000070C0000-memory.dmpFilesize
320KB
-
memory/2204-172-0x0000000006FD0000-0x0000000007062000-memory.dmpFilesize
584KB
-
memory/2204-171-0x0000000007490000-0x0000000007A34000-memory.dmpFilesize
5.6MB
-
memory/2204-130-0x0000000000840000-0x00000000008A4000-memory.dmpFilesize
400KB
-
memory/3684-170-0x0000000000000000-mapping.dmp
-
memory/3876-136-0x0000000000000000-mapping.dmp
-
memory/3956-149-0x0000000000000000-mapping.dmp
-
memory/4024-169-0x0000000000000000-mapping.dmp
-
memory/4040-151-0x0000000000000000-mapping.dmp
-
memory/4144-165-0x0000000000000000-mapping.dmp
-
memory/4160-162-0x0000000000000000-mapping.dmp
-
memory/4164-153-0x0000000000000000-mapping.dmp
-
memory/4260-164-0x0000000000000000-mapping.dmp
-
memory/4268-163-0x0000000000000000-mapping.dmp
-
memory/4272-133-0x0000000000000000-mapping.dmp
-
memory/4336-131-0x0000000000000000-mapping.dmp
-
memory/4364-158-0x0000000000000000-mapping.dmp
-
memory/4428-159-0x0000000000000000-mapping.dmp
-
memory/4456-154-0x0000000000000000-mapping.dmp
-
memory/4460-144-0x0000000000000000-mapping.dmp
-
memory/4492-177-0x0000000005630000-0x00000000056CC000-memory.dmpFilesize
624KB
-
memory/4492-174-0x0000000000000000-mapping.dmp
-
memory/4492-178-0x0000000006970000-0x0000000006B32000-memory.dmpFilesize
1.8MB
-
memory/4492-175-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/4492-179-0x00000000068F0000-0x00000000068FA000-memory.dmpFilesize
40KB
-
memory/4592-152-0x0000000000000000-mapping.dmp
-
memory/4732-140-0x0000000000000000-mapping.dmp
-
memory/4824-150-0x0000000000000000-mapping.dmp
-
memory/4836-143-0x0000000000000000-mapping.dmp
-
memory/4868-156-0x0000000000000000-mapping.dmp
-
memory/4884-145-0x0000000000000000-mapping.dmp
-
memory/4928-138-0x0000000000000000-mapping.dmp
-
memory/4996-155-0x0000000000000000-mapping.dmp
-
memory/5080-132-0x0000000000000000-mapping.dmp