Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-06-2022 07:24
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Purchase Order.js
Resource
win10v2004-20220414-en
General
-
Target
Purchase Order.js
-
Size
543KB
-
MD5
7455e47fd3e5f66fc5b6e1807ea0b568
-
SHA1
f4b3b59f3bc167f56fcf252f725a2b27d40a9de6
-
SHA256
5ca1451c5426fb3bb6e4394f5e52ee6651683e78aba996da2afd7c4077c8bd9b
-
SHA512
8488b277dcac7f1e3cc40b3fe292cf07bdbe441ea695afef5d594442bb6529eee40236b977e739613fd993a03d51038328dbe10dfb1958fe0586491f1209bda3
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5391573401:AAGU5n0aN7puxUq5oVT1MVi83gk5owTXei0/sendMessage?chat_id=1962160861
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger Payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Tempwinlogon.exe family_snakekeylogger C:\Users\Admin\AppData\Local\Tempwinlogon.exe family_snakekeylogger behavioral2/memory/5008-137-0x0000000000970000-0x0000000000994000-memory.dmp family_snakekeylogger -
Blocklisted process makes network request 15 IoCs
Processes:
wscript.exeflow pid process 7 4728 wscript.exe 16 4728 wscript.exe 22 4728 wscript.exe 31 4728 wscript.exe 35 4728 wscript.exe 38 4728 wscript.exe 39 4728 wscript.exe 42 4728 wscript.exe 43 4728 wscript.exe 44 4728 wscript.exe 47 4728 wscript.exe 48 4728 wscript.exe 49 4728 wscript.exe 50 4728 wscript.exe 51 4728 wscript.exe -
Executes dropped EXE 1 IoCs
Processes:
Tempwinlogon.exepid process 5008 Tempwinlogon.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exewscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FuJoSGMkge.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FuJoSGMkge.js wscript.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Tempwinlogon.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Tempwinlogon.exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Tempwinlogon.exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Tempwinlogon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YVBPFHTJIQ = "\"C:\\Users\\Admin\\AppData\\Roaming\\FuJoSGMkge.js\"" wscript.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 checkip.dyndns.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Tempwinlogon.exepid process 5008 Tempwinlogon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Tempwinlogon.exedescription pid process Token: SeDebugPrivilege 5008 Tempwinlogon.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
wscript.exewscript.exedescription pid process target process PID 4284 wrote to memory of 4728 4284 wscript.exe wscript.exe PID 4284 wrote to memory of 4728 4284 wscript.exe wscript.exe PID 4284 wrote to memory of 2440 4284 wscript.exe wscript.exe PID 4284 wrote to memory of 2440 4284 wscript.exe wscript.exe PID 2440 wrote to memory of 5008 2440 wscript.exe Tempwinlogon.exe PID 2440 wrote to memory of 5008 2440 wscript.exe Tempwinlogon.exe PID 2440 wrote to memory of 5008 2440 wscript.exe Tempwinlogon.exe -
outlook_office_path 1 IoCs
Processes:
Tempwinlogon.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Tempwinlogon.exe -
outlook_win_path 1 IoCs
Processes:
Tempwinlogon.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Tempwinlogon.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\Purchase Order.js"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\FuJoSGMkge.js"2⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
PID:4728 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\Tamba.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Tempwinlogon.exe"C:\Users\Admin\AppData\Local\Tempwinlogon.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:5008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD54eb2e71f5af75446efae80ee4457ac16
SHA122f002cee2b80eef7a4fbe5daa596a6eca5056a2
SHA25682c959dc9c7960278bf6094af37d6fff0387602769202afd496c97835c91c8af
SHA512b1fb12b37ebef5b5955bc932b8bc5f3428d64f8278056a4f4a6569ac2d1716fa0498b69536623914a1d8a3591dc5cf374501c1eff94095975abfaad73d01c984
-
Filesize
125KB
MD58855fe5a81d674f17f378896eb0effc1
SHA1e27c1b5b9f21501cd889c960b16c0951f3204aca
SHA256f11b2c02ce17039f849429b4904c2ec75ad1c6a0b7204c42238df6ae587b4be4
SHA512c3ca4ee469ed41b2f8ab4075fc17f462041fe533dfa175b3c48fd907d6dd0feb5a35657f8780479c5e5498e094ae5b14d31f61fd6a9294b8cae3fc035b996e39
-
Filesize
125KB
MD58855fe5a81d674f17f378896eb0effc1
SHA1e27c1b5b9f21501cd889c960b16c0951f3204aca
SHA256f11b2c02ce17039f849429b4904c2ec75ad1c6a0b7204c42238df6ae587b4be4
SHA512c3ca4ee469ed41b2f8ab4075fc17f462041fe533dfa175b3c48fd907d6dd0feb5a35657f8780479c5e5498e094ae5b14d31f61fd6a9294b8cae3fc035b996e39
-
Filesize
35KB
MD5afe01f4709bcc51afd50354eaeb32a15
SHA14bdc7ccc0337f68c7a74661c774f9a2fd4c3a19e
SHA256bd47423ced848fab516ff3d230d35a82a82b17d748bd489e1f25e587e90bbb92
SHA5124d810584b54860361c201327a276d8734fbfcebe64ee42b083b8819067093f25a64aa85991a86b5957496b58b68271a22f12bdd3c11f01b05e11229b08f5417f