Analysis

  • max time kernel
    44s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    06-07-2022 20:31

General

  • Target

    FINAL BL.pdf.exe

  • Size

    422KB

  • MD5

    9a903c6a1df5616594b6d64f6860fe37

  • SHA1

    fad9c0dcce2c0be8617a016baa1bc8326a6c62f0

  • SHA256

    4e0576bfe816a475d0a0e38a9c7456f8742d12f0c5a44a2244900214c37ad7e4

  • SHA512

    e3b01982cadda9c864a0b68eef6955f632553bd1dc72a0e81191f26d1fd434544c81c02dfc925f856e178de776f3ef58840007fa77fbba9dad7bafbe13b3e419

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1507062795:AAEBb0H5OYbp-dWwXk8ffQp0InjOhKxhpbU/sendMessage?chat_id=1663822858

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger Payload 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FINAL BL.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\FINAL BL.pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SSHnkqdBlPISZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5CC1.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1516
    • C:\Users\Admin\AppData\Local\Temp\FINAL BL.pdf.exe
      "{path}"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:1320

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp5CC1.tmp
    Filesize

    1KB

    MD5

    d875c2e9bdeb399fdad91d06e0c09bf7

    SHA1

    fdd0cef99aa8a1a6b18695a5be1bb646a545dd07

    SHA256

    a029a243fbf8d441f47ff9e12203d4b381f1d3d3dcc5859a01aaabd11b8a0c60

    SHA512

    7537c7ef275d336000bdfc71a3fbe488ec9340e00771a1025915062e646aa097865650e5741eadbec1004a1c7be221136084b5188e2ae6a2db609eac10a6f8f5

  • memory/1320-64-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1320-67-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1320-72-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1320-70-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1320-68-0x000000000042031E-mapping.dmp
  • memory/1320-66-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1320-61-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1320-62-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1356-54-0x00000000009F0000-0x0000000000A60000-memory.dmp
    Filesize

    448KB

  • memory/1356-55-0x0000000076191000-0x0000000076193000-memory.dmp
    Filesize

    8KB

  • memory/1356-56-0x0000000000980000-0x000000000098A000-memory.dmp
    Filesize

    40KB

  • memory/1356-58-0x0000000004C40000-0x0000000004C66000-memory.dmp
    Filesize

    152KB

  • memory/1356-57-0x0000000004F20000-0x0000000004F90000-memory.dmp
    Filesize

    448KB

  • memory/1516-59-0x0000000000000000-mapping.dmp