Analysis

  • max time kernel
    61s
  • max time network
    128s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • submitted
    06-07-2022 17:43

General

  • Target

    3e87183a936f145d4b65810e959e47de8832bbcc108fee8ddc350e9fd44287b5.exe

  • Size

    552KB

  • MD5

    afc39b488a7940c95cd7fb68049411d5

  • SHA1

    85db9fbdc33ff128dc6d444fc4988af9a7088dce

  • SHA256

    3e87183a936f145d4b65810e959e47de8832bbcc108fee8ddc350e9fd44287b5

  • SHA512

    170ca840a8dbd7df752d250fd2338f1e333c747f73a07547c84081ea5e376447070d76990c2e1c9be114a94020ece1a4dd1fbfe3d66070f2c5def7ffc9327f7f

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    cp5ua.hyperhost.ua
  • Port:
    587
  • Username:
    frankjoelog@valete.buzz
  • Password:
    7213575aceACE@#$
  • Email To:
    frankjoe@valete.buzz
C2

https://api.telegram.org/bot5321688653:AAEI2yqGrOA_-sRZ3xaqutrexraSgFa0AnA/sendMessage?chat_id=5048077662

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger Payload 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e87183a936f145d4b65810e959e47de8832bbcc108fee8ddc350e9fd44287b5.exe
    "C:\Users\Admin\AppData\Local\Temp\3e87183a936f145d4b65810e959e47de8832bbcc108fee8ddc350e9fd44287b5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Admin\AppData\Local\Temp\3e87183a936f145d4b65810e959e47de8832bbcc108fee8ddc350e9fd44287b5.exe
      "C:\Users\Admin\AppData\Local\Temp\3e87183a936f145d4b65810e959e47de8832bbcc108fee8ddc350e9fd44287b5.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:2248

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3e87183a936f145d4b65810e959e47de8832bbcc108fee8ddc350e9fd44287b5.exe.log
    Filesize

    1KB

    MD5

    08c99c62efb4c55287f7e109f3f73898

    SHA1

    014fc140a2281b1b1d6624e107501aa37d044e30

    SHA256

    e396974e7b4e46f23ce4b3db8bee3bcb8b16a8fdd98b8277540d359e47cd7c03

    SHA512

    30e28a60e00bcab92e23be98b5d5cf428c136d0819223f20bd82a44cac31fa1c9a43b80371293f5d74db057c3187fe5782dbcfcd1310a15655d3c72b08451719

  • memory/1908-119-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-120-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-121-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-122-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-123-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-124-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-125-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-126-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-127-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-128-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-130-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-129-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-131-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-133-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-132-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-134-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-135-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-136-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-137-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-138-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-139-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-140-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-141-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-142-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-143-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-144-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-145-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-146-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-147-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-148-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-149-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-150-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-151-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-152-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-153-0x00000000007C0000-0x0000000000850000-memory.dmp
    Filesize

    576KB

  • memory/1908-154-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-155-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-156-0x0000000005630000-0x0000000005B2E000-memory.dmp
    Filesize

    5.0MB

  • memory/1908-157-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-158-0x0000000005130000-0x00000000051C2000-memory.dmp
    Filesize

    584KB

  • memory/1908-159-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-160-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-161-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-162-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-163-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-164-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-165-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-166-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-167-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-168-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-169-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-170-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-171-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-172-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-173-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-174-0x00000000051E0000-0x00000000051EA000-memory.dmp
    Filesize

    40KB

  • memory/1908-175-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-176-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-177-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-178-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-179-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-180-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-182-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-181-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-183-0x0000000005310000-0x000000000532E000-memory.dmp
    Filesize

    120KB

  • memory/1908-184-0x0000000005620000-0x000000000562E000-memory.dmp
    Filesize

    56KB

  • memory/1908-185-0x0000000008810000-0x000000000885B000-memory.dmp
    Filesize

    300KB

  • memory/1908-186-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/1908-187-0x0000000008A80000-0x0000000008AEE000-memory.dmp
    Filesize

    440KB

  • memory/1908-188-0x0000000008BB0000-0x0000000008C4C000-memory.dmp
    Filesize

    624KB

  • memory/1908-189-0x0000000008CC0000-0x0000000008D26000-memory.dmp
    Filesize

    408KB

  • memory/1908-190-0x0000000008B70000-0x0000000008B96000-memory.dmp
    Filesize

    152KB

  • memory/2248-191-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/2248-192-0x000000000042048E-mapping.dmp
  • memory/2248-193-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-194-0x0000000077080000-0x000000007720E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-261-0x0000000006260000-0x0000000006422000-memory.dmp
    Filesize

    1.8MB