Analysis
-
max time kernel
131s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
06-07-2022 16:48
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.AIDetectNet.01.14971.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.W32.AIDetectNet.01.14971.exe
Resource
win10v2004-20220414-en
General
-
Target
SecuriteInfo.com.W32.AIDetectNet.01.14971.exe
-
Size
517KB
-
MD5
dd1c8fbeb5ccb5431ce8c6111a3dac1a
-
SHA1
995027f1597164742533cc899095ebaa8b8b407d
-
SHA256
15b8325df5457903aa6a8f86ddd64b7ea2fca232231e2e63044a1a0f9cc3f73b
-
SHA512
27f22c5805909f57c96cd669d0469449215417ae099e57e3341271e05a654bbd904307f680b7af527f00f56d426f3f5ac716869dbb793b222e6bb2e89ed112e3
Malware Config
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger Payload 9 IoCs
resource yara_rule behavioral1/memory/240-72-0x0000000000400000-0x000000000045C000-memory.dmp family_snakekeylogger behavioral1/memory/240-74-0x0000000000400000-0x000000000045C000-memory.dmp family_snakekeylogger behavioral1/memory/240-75-0x0000000000403248-mapping.dmp family_snakekeylogger behavioral1/memory/240-78-0x0000000000400000-0x000000000045C000-memory.dmp family_snakekeylogger behavioral1/files/0x00080000000133d2-79.dat family_snakekeylogger behavioral1/files/0x00080000000133d2-81.dat family_snakekeylogger behavioral1/files/0x00080000000133d2-82.dat family_snakekeylogger behavioral1/memory/240-86-0x0000000000400000-0x000000000045C000-memory.dmp family_snakekeylogger behavioral1/memory/1160-88-0x0000000000D30000-0x0000000000D56000-memory.dmp family_snakekeylogger -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SERVER.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" SERVER.EXE -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4 = "C:\\Users\\Admin\\AppData\\Roaming\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4.exe" iexplore.exe -
Executes dropped EXE 2 IoCs
pid Process 1160 EGGM.EXE 1824 SERVER.EXE -
Loads dropped DLL 5 IoCs
pid Process 240 InstallUtil.exe 240 InstallUtil.exe 1824 SERVER.EXE 1824 SERVER.EXE 1824 SERVER.EXE -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" SERVER.EXE -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 EGGM.EXE Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 EGGM.EXE Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 EGGM.EXE -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4 = "C:\\Users\\Admin\\AppData\\Roaming\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4.exe" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dbxpk = "\"C:\\Users\\Admin\\AppData\\Roaming\\Icnvul\\Dbxpk.exe\"" SecuriteInfo.com.W32.AIDetectNet.01.14971.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4 = "C:\\Users\\Admin\\AppData\\Roaming\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SERVER.EXE -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 checkip.dyndns.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1100 set thread context of 240 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 29 PID 1824 set thread context of 996 1824 SERVER.EXE 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1084 powershell.exe 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 1160 EGGM.EXE 1824 SERVER.EXE 1824 SERVER.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe Token: SeDebugPrivilege 1084 powershell.exe Token: SeDebugPrivilege 1160 EGGM.EXE Token: SeDebugPrivilege 996 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1824 SERVER.EXE 996 iexplore.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1084 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 27 PID 1100 wrote to memory of 1084 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 27 PID 1100 wrote to memory of 1084 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 27 PID 1100 wrote to memory of 1084 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 27 PID 1100 wrote to memory of 240 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 29 PID 1100 wrote to memory of 240 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 29 PID 1100 wrote to memory of 240 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 29 PID 1100 wrote to memory of 240 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 29 PID 1100 wrote to memory of 240 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 29 PID 1100 wrote to memory of 240 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 29 PID 1100 wrote to memory of 240 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 29 PID 1100 wrote to memory of 240 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 29 PID 1100 wrote to memory of 240 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 29 PID 1100 wrote to memory of 240 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 29 PID 1100 wrote to memory of 240 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 29 PID 1100 wrote to memory of 240 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 29 PID 1100 wrote to memory of 240 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 29 PID 1100 wrote to memory of 240 1100 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 29 PID 240 wrote to memory of 1160 240 InstallUtil.exe 30 PID 240 wrote to memory of 1160 240 InstallUtil.exe 30 PID 240 wrote to memory of 1160 240 InstallUtil.exe 30 PID 240 wrote to memory of 1160 240 InstallUtil.exe 30 PID 240 wrote to memory of 1824 240 InstallUtil.exe 31 PID 240 wrote to memory of 1824 240 InstallUtil.exe 31 PID 240 wrote to memory of 1824 240 InstallUtil.exe 31 PID 240 wrote to memory of 1824 240 InstallUtil.exe 31 PID 240 wrote to memory of 1824 240 InstallUtil.exe 31 PID 240 wrote to memory of 1824 240 InstallUtil.exe 31 PID 240 wrote to memory of 1824 240 InstallUtil.exe 31 PID 1824 wrote to memory of 996 1824 SERVER.EXE 32 PID 1824 wrote to memory of 996 1824 SERVER.EXE 32 PID 1824 wrote to memory of 996 1824 SERVER.EXE 32 PID 1824 wrote to memory of 996 1824 SERVER.EXE 32 PID 1824 wrote to memory of 996 1824 SERVER.EXE 32 PID 1824 wrote to memory of 996 1824 SERVER.EXE 32 PID 1824 wrote to memory of 996 1824 SERVER.EXE 32 PID 1824 wrote to memory of 996 1824 SERVER.EXE 32 PID 1824 wrote to memory of 996 1824 SERVER.EXE 32 PID 1824 wrote to memory of 996 1824 SERVER.EXE 32 PID 1824 wrote to memory of 996 1824 SERVER.EXE 32 PID 1824 wrote to memory of 996 1824 SERVER.EXE 32 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SERVER.EXE -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 EGGM.EXE -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 EGGM.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetectNet.01.14971.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetectNet.01.14971.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Users\Admin\AppData\Local\Temp\EGGM.EXE"C:\Users\Admin\AppData\Local\Temp\EGGM.EXE"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\SERVER.EXE"C:\Users\Admin\AppData\Local\Temp\SERVER.EXE"3⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1824 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\SERVER.EXE4⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:996
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD5350dfc66657d2d9b2231bf8bfe33497b
SHA10fb28b28c416d21f1db2d54355e89fa8ec3e3324
SHA256a2bb808321745ce0239b5a84c78a801644d903ce8a6ab87193337aaf2d01fc31
SHA512635132ff935ea13048839d2c535d5abbae53c77d332df7c7628dbbb5db94ffc3b5be7820bb116da94433d6c814b5b4b6811bcc32b22cae3adffb086664e010e5
-
Filesize
126KB
MD5350dfc66657d2d9b2231bf8bfe33497b
SHA10fb28b28c416d21f1db2d54355e89fa8ec3e3324
SHA256a2bb808321745ce0239b5a84c78a801644d903ce8a6ab87193337aaf2d01fc31
SHA512635132ff935ea13048839d2c535d5abbae53c77d332df7c7628dbbb5db94ffc3b5be7820bb116da94433d6c814b5b4b6811bcc32b22cae3adffb086664e010e5
-
Filesize
172KB
MD581912e3dd162ce7c96114a84d0d58b29
SHA12def8b1c48c9e550f57c9dab915c5232a7113d57
SHA256f91cf396d6cc0e3803aa25fd0770e9a252196ae616e032e4880668c8ded74dc0
SHA512893b3c4483d0a307cad24c73fce27bc4e02438439fc5b07d596146bdb92767e53e60642ff6264ce80891b10c0a7f2a3f5b397560a47ee6e1244d6e5e9a80f341
-
Filesize
172KB
MD581912e3dd162ce7c96114a84d0d58b29
SHA12def8b1c48c9e550f57c9dab915c5232a7113d57
SHA256f91cf396d6cc0e3803aa25fd0770e9a252196ae616e032e4880668c8ded74dc0
SHA512893b3c4483d0a307cad24c73fce27bc4e02438439fc5b07d596146bdb92767e53e60642ff6264ce80891b10c0a7f2a3f5b397560a47ee6e1244d6e5e9a80f341
-
Filesize
126KB
MD5350dfc66657d2d9b2231bf8bfe33497b
SHA10fb28b28c416d21f1db2d54355e89fa8ec3e3324
SHA256a2bb808321745ce0239b5a84c78a801644d903ce8a6ab87193337aaf2d01fc31
SHA512635132ff935ea13048839d2c535d5abbae53c77d332df7c7628dbbb5db94ffc3b5be7820bb116da94433d6c814b5b4b6811bcc32b22cae3adffb086664e010e5
-
Filesize
172KB
MD581912e3dd162ce7c96114a84d0d58b29
SHA12def8b1c48c9e550f57c9dab915c5232a7113d57
SHA256f91cf396d6cc0e3803aa25fd0770e9a252196ae616e032e4880668c8ded74dc0
SHA512893b3c4483d0a307cad24c73fce27bc4e02438439fc5b07d596146bdb92767e53e60642ff6264ce80891b10c0a7f2a3f5b397560a47ee6e1244d6e5e9a80f341
-
Filesize
172KB
MD581912e3dd162ce7c96114a84d0d58b29
SHA12def8b1c48c9e550f57c9dab915c5232a7113d57
SHA256f91cf396d6cc0e3803aa25fd0770e9a252196ae616e032e4880668c8ded74dc0
SHA512893b3c4483d0a307cad24c73fce27bc4e02438439fc5b07d596146bdb92767e53e60642ff6264ce80891b10c0a7f2a3f5b397560a47ee6e1244d6e5e9a80f341
-
Filesize
172KB
MD581912e3dd162ce7c96114a84d0d58b29
SHA12def8b1c48c9e550f57c9dab915c5232a7113d57
SHA256f91cf396d6cc0e3803aa25fd0770e9a252196ae616e032e4880668c8ded74dc0
SHA512893b3c4483d0a307cad24c73fce27bc4e02438439fc5b07d596146bdb92767e53e60642ff6264ce80891b10c0a7f2a3f5b397560a47ee6e1244d6e5e9a80f341
-
Filesize
172KB
MD581912e3dd162ce7c96114a84d0d58b29
SHA12def8b1c48c9e550f57c9dab915c5232a7113d57
SHA256f91cf396d6cc0e3803aa25fd0770e9a252196ae616e032e4880668c8ded74dc0
SHA512893b3c4483d0a307cad24c73fce27bc4e02438439fc5b07d596146bdb92767e53e60642ff6264ce80891b10c0a7f2a3f5b397560a47ee6e1244d6e5e9a80f341