Resubmissions

19-03-2023 18:05

230319-wpjcdsbf4x 10

04-07-2022 18:06

220704-wprzjaaegl 10

Analysis

  • max time kernel
    137s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    04-07-2022 18:06

General

  • Target

    MV. NEW BRIDGE (EX THORCO SVENDBORG)..xll

  • Size

    1.7MB

  • MD5

    e772d046be7fbfbe96e90eca5ab20566

  • SHA1

    286d9bcf13c0cb309f9041f2ea03e5ce99848669

  • SHA256

    92c7146dd4dd24206b2c0b9dee831bdd772eced8b8d5c67b3b73e31bababea82

  • SHA512

    4c79623f6c7c557169da85715e69f387ef2d98a16ab35516768ef921e65e791d1301d2574a6703b1e7c9fb6902d69bef341908294ba31469e57321533de70103

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1707668650:AAFJBUcmT6aGlXwy3-beDARhm0ji930DCzM/sendMessage?chat_id=-772314354

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger Payload 1 IoCs
  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\MV. NEW BRIDGE (EX THORCO SVENDBORG)..xll"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3568
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /C certutil -decode C:\Users\Admin\Downloads\appBQQRFLOQKX.txt C:\Users\Admin\Downloads\appBQQRFLOQKX.txt.xlsx
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Windows\system32\certutil.exe
        certutil -decode C:\Users\Admin\Downloads\appBQQRFLOQKX.txt C:\Users\Admin\Downloads\appBQQRFLOQKX.txt.xlsx
        3⤵
          PID:4016
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /C certutil -decode C:\Users\Admin\Downloads\appBQQRFLOQKX.txt C:\Users\Admin\Downloads\appBQQRFLOQKX.txt.exe &
        2⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:3104
        • C:\Windows\system32\certutil.exe
          certutil -decode C:\Users\Admin\Downloads\appBQQRFLOQKX.txt C:\Users\Admin\Downloads\appBQQRFLOQKX.txt.exe
          3⤵
            PID:3056
        • C:\Users\Admin\Downloads\appBQQRFLOQKX.txt.exe
          "C:\Users\Admin\Downloads\appBQQRFLOQKX.txt.exe"
          2⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1324
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwAA==
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3956
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            3⤵
            • Accesses Microsoft Outlook profiles
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:1600

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      3
      T1012

      System Information Discovery

      4
      T1082

      Collection

      Email Collection

      1
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\MV. NEW BRIDGE (EX THORCO SVENDBORG)..xll
        Filesize

        1.7MB

        MD5

        e772d046be7fbfbe96e90eca5ab20566

        SHA1

        286d9bcf13c0cb309f9041f2ea03e5ce99848669

        SHA256

        92c7146dd4dd24206b2c0b9dee831bdd772eced8b8d5c67b3b73e31bababea82

        SHA512

        4c79623f6c7c557169da85715e69f387ef2d98a16ab35516768ef921e65e791d1301d2574a6703b1e7c9fb6902d69bef341908294ba31469e57321533de70103

      • C:\Users\Admin\AppData\Local\Temp\MV. NEW BRIDGE (EX THORCO SVENDBORG)..xll
        Filesize

        1.7MB

        MD5

        e772d046be7fbfbe96e90eca5ab20566

        SHA1

        286d9bcf13c0cb309f9041f2ea03e5ce99848669

        SHA256

        92c7146dd4dd24206b2c0b9dee831bdd772eced8b8d5c67b3b73e31bababea82

        SHA512

        4c79623f6c7c557169da85715e69f387ef2d98a16ab35516768ef921e65e791d1301d2574a6703b1e7c9fb6902d69bef341908294ba31469e57321533de70103

      • C:\Users\Admin\Downloads\appBQQRFLOQKX.txt
        Filesize

        24KB

        MD5

        fbefbe8ae4a09ba8018b2d7ff9143f3e

        SHA1

        c03cd7561d6a64f754c65bda8faa5a434eb04e0b

        SHA256

        881a15d10e000d20b2179290d340e1234f46301569f19e34fe06f82f37cb32c8

        SHA512

        490167845d6930e10339e83a5e60181e78a718b8975eccb6bb104467020b4fd4b080be20e463e5bfe681549e843999a2b90b3f48db737229e8a0bdc198af7189

      • C:\Users\Admin\Downloads\appBQQRFLOQKX.txt
        Filesize

        58B

        MD5

        759d88148f2999ed1b1db44c9b1be24d

        SHA1

        6a427759e0dfb9ebc2826a239dd3c7ffb2d39a36

        SHA256

        22a3bb08dd922fa426a32104fb211b5b6897f286913f74e349c55dcec45e307c

        SHA512

        0b3c1cbc98c7f6839b7654f80037e5efd0ea06a62ef3afb52423d27cd283aee4b844befed5fb0f1f65f89fe472a455a255f911e9a296206758e53666fdd5d852

      • C:\Users\Admin\Downloads\appBQQRFLOQKX.txt.exe
        Filesize

        174KB

        MD5

        29e69c25d02c5a45e62f038f7aa7a716

        SHA1

        9aa09cd4c4126cd410a2674a37d34d1d7575d8b0

        SHA256

        cb191c1c612b01447bd75c880c223fa73c82f9902bc6e6a26881031b0a9bf9db

        SHA512

        b626b753d4e9daf4ab42e0fe00213600a12874822703c7d7c9fb6a2c8548885ad6f30b341c317780146ac5c7dacf11331071cc721c0cc9a411c4386dc6ee00e9

      • C:\Users\Admin\Downloads\appBQQRFLOQKX.txt.exe
        Filesize

        174KB

        MD5

        29e69c25d02c5a45e62f038f7aa7a716

        SHA1

        9aa09cd4c4126cd410a2674a37d34d1d7575d8b0

        SHA256

        cb191c1c612b01447bd75c880c223fa73c82f9902bc6e6a26881031b0a9bf9db

        SHA512

        b626b753d4e9daf4ab42e0fe00213600a12874822703c7d7c9fb6a2c8548885ad6f30b341c317780146ac5c7dacf11331071cc721c0cc9a411c4386dc6ee00e9

      • C:\Users\Admin\Downloads\appBQQRFLOQKX.txt.xlsx
        Filesize

        18KB

        MD5

        aea065e068a1c885c5c82b9da16de628

        SHA1

        f6c1af23d9e30b77160bf0da4f56eaef94d853c1

        SHA256

        fcd49a887692286cd815e911fd667f9323152c4d13e37020f065aabd023ab0ca

        SHA512

        092247866bca90694c95e7d1db658baba7fd88c192fd8e2c132de896541b3a09b74b17055022dbb03789814a0a31c3ae57072e6ef6f3c88f2cd23c0ca8275c8a

      • memory/1188-141-0x0000000000000000-mapping.dmp
      • memory/1324-165-0x000000002FD70000-0x000000002FE02000-memory.dmp
        Filesize

        584KB

      • memory/1324-150-0x0000000000000000-mapping.dmp
      • memory/1324-153-0x0000000000EA0000-0x0000000000ED2000-memory.dmp
        Filesize

        200KB

      • memory/1600-166-0x0000000000000000-mapping.dmp
      • memory/1600-167-0x0000000000400000-0x0000000000426000-memory.dmp
        Filesize

        152KB

      • memory/1600-168-0x0000000004E20000-0x00000000053C4000-memory.dmp
        Filesize

        5.6MB

      • memory/1600-169-0x0000000004910000-0x00000000049AC000-memory.dmp
        Filesize

        624KB

      • memory/1600-170-0x00000000059A0000-0x0000000005B62000-memory.dmp
        Filesize

        1.8MB

      • memory/1600-171-0x0000000005910000-0x000000000591A000-memory.dmp
        Filesize

        40KB

      • memory/3056-148-0x0000000000000000-mapping.dmp
      • memory/3104-147-0x0000000000000000-mapping.dmp
      • memory/3568-164-0x0000014E1DC5C000-0x0000014E1DC5F000-memory.dmp
        Filesize

        12KB

      • memory/3568-133-0x00007FF8D0890000-0x00007FF8D08A0000-memory.dmp
        Filesize

        64KB

      • memory/3568-144-0x00007FF8E85F0000-0x00007FF8E90B1000-memory.dmp
        Filesize

        10.8MB

      • memory/3568-177-0x00007FF8E85F0000-0x00007FF8E90B1000-memory.dmp
        Filesize

        10.8MB

      • memory/3568-176-0x00007FF8D0890000-0x00007FF8D08A0000-memory.dmp
        Filesize

        64KB

      • memory/3568-175-0x00007FF8D0890000-0x00007FF8D08A0000-memory.dmp
        Filesize

        64KB

      • memory/3568-174-0x00007FF8D0890000-0x00007FF8D08A0000-memory.dmp
        Filesize

        64KB

      • memory/3568-173-0x00007FF8D0890000-0x00007FF8D08A0000-memory.dmp
        Filesize

        64KB

      • memory/3568-131-0x00007FF8D0890000-0x00007FF8D08A0000-memory.dmp
        Filesize

        64KB

      • memory/3568-132-0x00007FF8D0890000-0x00007FF8D08A0000-memory.dmp
        Filesize

        64KB

      • memory/3568-146-0x0000014E1DC5C000-0x0000014E1DC5F000-memory.dmp
        Filesize

        12KB

      • memory/3568-134-0x00007FF8D0890000-0x00007FF8D08A0000-memory.dmp
        Filesize

        64KB

      • memory/3568-135-0x00007FF8CDFC0000-0x00007FF8CDFD0000-memory.dmp
        Filesize

        64KB

      • memory/3568-163-0x00007FF8E85F0000-0x00007FF8E90B1000-memory.dmp
        Filesize

        10.8MB

      • memory/3568-130-0x00007FF8D0890000-0x00007FF8D08A0000-memory.dmp
        Filesize

        64KB

      • memory/3568-138-0x0000014E05560000-0x0000014E05733000-memory.dmp
        Filesize

        1.8MB

      • memory/3568-136-0x00007FF8CDFC0000-0x00007FF8CDFD0000-memory.dmp
        Filesize

        64KB

      • memory/3956-162-0x0000000006AB0000-0x0000000006ACA000-memory.dmp
        Filesize

        104KB

      • memory/3956-161-0x0000000007C00000-0x000000000827A000-memory.dmp
        Filesize

        6.5MB

      • memory/3956-160-0x00000000065B0000-0x00000000065CE000-memory.dmp
        Filesize

        120KB

      • memory/3956-159-0x0000000005EA0000-0x0000000005F06000-memory.dmp
        Filesize

        408KB

      • memory/3956-158-0x0000000005D30000-0x0000000005D96000-memory.dmp
        Filesize

        408KB

      • memory/3956-157-0x0000000005600000-0x0000000005622000-memory.dmp
        Filesize

        136KB

      • memory/3956-156-0x0000000005690000-0x0000000005CB8000-memory.dmp
        Filesize

        6.2MB

      • memory/3956-155-0x0000000004FF0000-0x0000000005026000-memory.dmp
        Filesize

        216KB

      • memory/3956-154-0x0000000000000000-mapping.dmp
      • memory/4016-142-0x0000000000000000-mapping.dmp