Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
06-07-2022 16:48
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.AIDetectNet.01.14971.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.W32.AIDetectNet.01.14971.exe
Resource
win10v2004-20220414-en
General
-
Target
SecuriteInfo.com.W32.AIDetectNet.01.14971.exe
-
Size
517KB
-
MD5
dd1c8fbeb5ccb5431ce8c6111a3dac1a
-
SHA1
995027f1597164742533cc899095ebaa8b8b407d
-
SHA256
15b8325df5457903aa6a8f86ddd64b7ea2fca232231e2e63044a1a0f9cc3f73b
-
SHA512
27f22c5805909f57c96cd669d0469449215417ae099e57e3341271e05a654bbd904307f680b7af527f00f56d426f3f5ac716869dbb793b222e6bb2e89ed112e3
Malware Config
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger Payload 8 IoCs
resource yara_rule behavioral2/memory/1432-141-0x0000000000400000-0x000000000045C000-memory.dmp family_snakekeylogger behavioral2/memory/1432-142-0x0000000000400000-0x000000000045C000-memory.dmp family_snakekeylogger behavioral2/memory/1432-143-0x0000000000400000-0x000000000045C000-memory.dmp family_snakekeylogger behavioral2/memory/1432-144-0x0000000000400000-0x000000000045C000-memory.dmp family_snakekeylogger behavioral2/files/0x00040000000162b4-146.dat family_snakekeylogger behavioral2/files/0x00040000000162b4-147.dat family_snakekeylogger behavioral2/memory/4784-148-0x0000000000CF0000-0x0000000000D16000-memory.dmp family_snakekeylogger behavioral2/memory/1432-152-0x0000000000400000-0x000000000045C000-memory.dmp family_snakekeylogger -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SERVER.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" SERVER.EXE -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4 = "C:\\Users\\Admin\\AppData\\Roaming\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4.exe" iexplore.exe -
Executes dropped EXE 2 IoCs
pid Process 4784 EGGM.EXE 424 SERVER.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.W32.AIDetectNet.01.14971.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" SERVER.EXE -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 EGGM.EXE Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 EGGM.EXE Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 EGGM.EXE -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dbxpk = "\"C:\\Users\\Admin\\AppData\\Roaming\\Icnvul\\Dbxpk.exe\"" SecuriteInfo.com.W32.AIDetectNet.01.14971.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4 = "C:\\Users\\Admin\\AppData\\Roaming\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4 = "C:\\Users\\Admin\\AppData\\Roaming\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4.exe" iexplore.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SERVER.EXE -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 checkip.dyndns.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1028 set thread context of 1432 1028 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 90 PID 424 set thread context of 3104 424 SERVER.EXE 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2756 powershell.exe 2756 powershell.exe 1028 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 1028 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 4784 EGGM.EXE 424 SERVER.EXE 424 SERVER.EXE 424 SERVER.EXE 424 SERVER.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1028 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeDebugPrivilege 4784 EGGM.EXE Token: SeDebugPrivilege 3104 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 424 SERVER.EXE 3104 iexplore.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1028 wrote to memory of 2756 1028 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 82 PID 1028 wrote to memory of 2756 1028 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 82 PID 1028 wrote to memory of 2756 1028 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 82 PID 1028 wrote to memory of 1432 1028 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 90 PID 1028 wrote to memory of 1432 1028 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 90 PID 1028 wrote to memory of 1432 1028 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 90 PID 1028 wrote to memory of 1432 1028 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 90 PID 1028 wrote to memory of 1432 1028 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 90 PID 1028 wrote to memory of 1432 1028 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 90 PID 1028 wrote to memory of 1432 1028 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 90 PID 1028 wrote to memory of 1432 1028 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 90 PID 1028 wrote to memory of 1432 1028 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 90 PID 1028 wrote to memory of 1432 1028 SecuriteInfo.com.W32.AIDetectNet.01.14971.exe 90 PID 1432 wrote to memory of 4784 1432 InstallUtil.exe 91 PID 1432 wrote to memory of 4784 1432 InstallUtil.exe 91 PID 1432 wrote to memory of 4784 1432 InstallUtil.exe 91 PID 1432 wrote to memory of 424 1432 InstallUtil.exe 92 PID 1432 wrote to memory of 424 1432 InstallUtil.exe 92 PID 1432 wrote to memory of 424 1432 InstallUtil.exe 92 PID 424 wrote to memory of 3104 424 SERVER.EXE 93 PID 424 wrote to memory of 3104 424 SERVER.EXE 93 PID 424 wrote to memory of 3104 424 SERVER.EXE 93 PID 424 wrote to memory of 3104 424 SERVER.EXE 93 PID 424 wrote to memory of 3104 424 SERVER.EXE 93 PID 424 wrote to memory of 3104 424 SERVER.EXE 93 PID 424 wrote to memory of 3104 424 SERVER.EXE 93 PID 424 wrote to memory of 3104 424 SERVER.EXE 93 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SERVER.EXE -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 EGGM.EXE -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 EGGM.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetectNet.01.14971.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetectNet.01.14971.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\EGGM.EXE"C:\Users\Admin\AppData\Local\Temp\EGGM.EXE"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4784
-
-
C:\Users\Admin\AppData\Local\Temp\SERVER.EXE"C:\Users\Admin\AppData\Local\Temp\SERVER.EXE"3⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:424 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\SERVER.EXE4⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3104
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD5350dfc66657d2d9b2231bf8bfe33497b
SHA10fb28b28c416d21f1db2d54355e89fa8ec3e3324
SHA256a2bb808321745ce0239b5a84c78a801644d903ce8a6ab87193337aaf2d01fc31
SHA512635132ff935ea13048839d2c535d5abbae53c77d332df7c7628dbbb5db94ffc3b5be7820bb116da94433d6c814b5b4b6811bcc32b22cae3adffb086664e010e5
-
Filesize
126KB
MD5350dfc66657d2d9b2231bf8bfe33497b
SHA10fb28b28c416d21f1db2d54355e89fa8ec3e3324
SHA256a2bb808321745ce0239b5a84c78a801644d903ce8a6ab87193337aaf2d01fc31
SHA512635132ff935ea13048839d2c535d5abbae53c77d332df7c7628dbbb5db94ffc3b5be7820bb116da94433d6c814b5b4b6811bcc32b22cae3adffb086664e010e5
-
Filesize
172KB
MD581912e3dd162ce7c96114a84d0d58b29
SHA12def8b1c48c9e550f57c9dab915c5232a7113d57
SHA256f91cf396d6cc0e3803aa25fd0770e9a252196ae616e032e4880668c8ded74dc0
SHA512893b3c4483d0a307cad24c73fce27bc4e02438439fc5b07d596146bdb92767e53e60642ff6264ce80891b10c0a7f2a3f5b397560a47ee6e1244d6e5e9a80f341
-
Filesize
172KB
MD581912e3dd162ce7c96114a84d0d58b29
SHA12def8b1c48c9e550f57c9dab915c5232a7113d57
SHA256f91cf396d6cc0e3803aa25fd0770e9a252196ae616e032e4880668c8ded74dc0
SHA512893b3c4483d0a307cad24c73fce27bc4e02438439fc5b07d596146bdb92767e53e60642ff6264ce80891b10c0a7f2a3f5b397560a47ee6e1244d6e5e9a80f341