Analysis
-
max time kernel
91s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-07-2022 12:45
Static task
static1
Behavioral task
behavioral1
Sample
Mínimo Pedido.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Mínimo Pedido.exe
Resource
win10v2004-20220414-en
General
-
Target
Mínimo Pedido.exe
-
Size
694KB
-
MD5
4f543dbc253c5c634a42f051f88f0b68
-
SHA1
9cc2edc684daf498eb766aeddb983bb64065458c
-
SHA256
613dda5e32a5c2bf7f6a6992272a661f753d93d6c7ab761ae20a52e95f87803b
-
SHA512
27df8c8150c0d4faad9b86fe3af577752fa533892563d5cdd0e992c87ea1e6f98b8341f91fa4e5820bb4095f02bc70a57a14060e79d352f41914819584578149
Malware Config
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 8 IoCs
resource yara_rule behavioral2/memory/4444-141-0x0000000000400000-0x000000000045C000-memory.dmp family_snakekeylogger behavioral2/memory/4444-142-0x0000000000400000-0x000000000045C000-memory.dmp family_snakekeylogger behavioral2/memory/4444-143-0x0000000000400000-0x000000000045C000-memory.dmp family_snakekeylogger behavioral2/memory/4444-144-0x0000000000400000-0x000000000045C000-memory.dmp family_snakekeylogger behavioral2/files/0x0006000000022ede-147.dat family_snakekeylogger behavioral2/files/0x0006000000022ede-146.dat family_snakekeylogger behavioral2/memory/4212-151-0x0000000000020000-0x0000000000046000-memory.dmp family_snakekeylogger behavioral2/memory/4444-152-0x0000000000400000-0x000000000045C000-memory.dmp family_snakekeylogger -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SERVER.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" SERVER.EXE -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4 = "C:\\Users\\Admin\\AppData\\Roaming\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4.exe" iexplore.exe -
Executes dropped EXE 2 IoCs
pid Process 4212 EGGM.EXE 2076 SERVER.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation Mínimo Pedido.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" SERVER.EXE -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts iexplore.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 EGGM.EXE Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 EGGM.EXE Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 EGGM.EXE -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4 = "C:\\Users\\Admin\\AppData\\Roaming\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4 = "C:\\Users\\Admin\\AppData\\Roaming\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4.exe" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Arcwgfzxo = "\"C:\\Users\\Admin\\AppData\\Roaming\\Aqascpu\\Arcwgfzxo.exe\"" Mínimo Pedido.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SERVER.EXE -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 checkip.dyndns.org -
Program crash 1 IoCs
pid pid_target Process procid_target 4824 2312 WerFault.exe 94 -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 3848 set thread context of 4444 3848 Mínimo Pedido.exe 88 PID 2076 set thread context of 776 2076 SERVER.EXE 91 PID 776 set thread context of 3680 776 iexplore.exe 93 PID 776 set thread context of 2312 776 iexplore.exe 94 PID 776 set thread context of 4992 776 iexplore.exe 98 PID 776 set thread context of 3576 776 iexplore.exe 99 PID 776 set thread context of 3328 776 iexplore.exe 100 PID 776 set thread context of 1452 776 iexplore.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1052 powershell.exe 1052 powershell.exe 3848 Mínimo Pedido.exe 3848 Mínimo Pedido.exe 4212 EGGM.EXE 2076 SERVER.EXE 2076 SERVER.EXE 3680 iexplore.exe 3680 iexplore.exe 3576 iexplore.exe 3576 iexplore.exe 2076 SERVER.EXE 2076 SERVER.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3848 Mínimo Pedido.exe Token: SeDebugPrivilege 1052 powershell.exe Token: SeDebugPrivilege 4212 EGGM.EXE Token: SeDebugPrivilege 776 iexplore.exe Token: SeDebugPrivilege 3680 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2076 SERVER.EXE 776 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3848 wrote to memory of 1052 3848 Mínimo Pedido.exe 80 PID 3848 wrote to memory of 1052 3848 Mínimo Pedido.exe 80 PID 3848 wrote to memory of 1052 3848 Mínimo Pedido.exe 80 PID 3848 wrote to memory of 4444 3848 Mínimo Pedido.exe 88 PID 3848 wrote to memory of 4444 3848 Mínimo Pedido.exe 88 PID 3848 wrote to memory of 4444 3848 Mínimo Pedido.exe 88 PID 3848 wrote to memory of 4444 3848 Mínimo Pedido.exe 88 PID 3848 wrote to memory of 4444 3848 Mínimo Pedido.exe 88 PID 3848 wrote to memory of 4444 3848 Mínimo Pedido.exe 88 PID 3848 wrote to memory of 4444 3848 Mínimo Pedido.exe 88 PID 3848 wrote to memory of 4444 3848 Mínimo Pedido.exe 88 PID 3848 wrote to memory of 4444 3848 Mínimo Pedido.exe 88 PID 3848 wrote to memory of 4444 3848 Mínimo Pedido.exe 88 PID 4444 wrote to memory of 4212 4444 InstallUtil.exe 89 PID 4444 wrote to memory of 4212 4444 InstallUtil.exe 89 PID 4444 wrote to memory of 4212 4444 InstallUtil.exe 89 PID 4444 wrote to memory of 2076 4444 InstallUtil.exe 90 PID 4444 wrote to memory of 2076 4444 InstallUtil.exe 90 PID 4444 wrote to memory of 2076 4444 InstallUtil.exe 90 PID 2076 wrote to memory of 776 2076 SERVER.EXE 91 PID 2076 wrote to memory of 776 2076 SERVER.EXE 91 PID 2076 wrote to memory of 776 2076 SERVER.EXE 91 PID 2076 wrote to memory of 776 2076 SERVER.EXE 91 PID 2076 wrote to memory of 776 2076 SERVER.EXE 91 PID 2076 wrote to memory of 776 2076 SERVER.EXE 91 PID 2076 wrote to memory of 776 2076 SERVER.EXE 91 PID 2076 wrote to memory of 776 2076 SERVER.EXE 91 PID 776 wrote to memory of 3680 776 iexplore.exe 93 PID 776 wrote to memory of 3680 776 iexplore.exe 93 PID 776 wrote to memory of 3680 776 iexplore.exe 93 PID 776 wrote to memory of 3680 776 iexplore.exe 93 PID 776 wrote to memory of 3680 776 iexplore.exe 93 PID 776 wrote to memory of 3680 776 iexplore.exe 93 PID 776 wrote to memory of 3680 776 iexplore.exe 93 PID 776 wrote to memory of 3680 776 iexplore.exe 93 PID 776 wrote to memory of 2312 776 iexplore.exe 94 PID 776 wrote to memory of 2312 776 iexplore.exe 94 PID 776 wrote to memory of 2312 776 iexplore.exe 94 PID 776 wrote to memory of 2312 776 iexplore.exe 94 PID 776 wrote to memory of 2312 776 iexplore.exe 94 PID 776 wrote to memory of 2312 776 iexplore.exe 94 PID 776 wrote to memory of 2312 776 iexplore.exe 94 PID 776 wrote to memory of 2312 776 iexplore.exe 94 PID 776 wrote to memory of 2312 776 iexplore.exe 94 PID 776 wrote to memory of 4992 776 iexplore.exe 98 PID 776 wrote to memory of 4992 776 iexplore.exe 98 PID 776 wrote to memory of 4992 776 iexplore.exe 98 PID 776 wrote to memory of 4992 776 iexplore.exe 98 PID 776 wrote to memory of 4992 776 iexplore.exe 98 PID 776 wrote to memory of 4992 776 iexplore.exe 98 PID 776 wrote to memory of 4992 776 iexplore.exe 98 PID 776 wrote to memory of 4992 776 iexplore.exe 98 PID 776 wrote to memory of 4992 776 iexplore.exe 98 PID 776 wrote to memory of 3576 776 iexplore.exe 99 PID 776 wrote to memory of 3576 776 iexplore.exe 99 PID 776 wrote to memory of 3576 776 iexplore.exe 99 PID 776 wrote to memory of 3576 776 iexplore.exe 99 PID 776 wrote to memory of 3576 776 iexplore.exe 99 PID 776 wrote to memory of 3576 776 iexplore.exe 99 PID 776 wrote to memory of 3576 776 iexplore.exe 99 PID 776 wrote to memory of 3576 776 iexplore.exe 99 PID 776 wrote to memory of 3576 776 iexplore.exe 99 PID 776 wrote to memory of 3328 776 iexplore.exe 100 PID 776 wrote to memory of 3328 776 iexplore.exe 100 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SERVER.EXE -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 EGGM.EXE -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 EGGM.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mínimo Pedido.exe"C:\Users\Admin\AppData\Local\Temp\Mínimo Pedido.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\EGGM.EXE"C:\Users\Admin\AppData\Local\Temp\EGGM.EXE"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\SERVER.EXE"C:\Users\Admin\AppData\Local\Temp\SERVER.EXE"3⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2076 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\SERVER.EXE4⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe/stext "C:\Users\Admin\AppData\Roaming\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\ecbhzrooc0.txt"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe/stext "C:\Users\Admin\AppData\Roaming\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\ecbhzrooc1.txt"5⤵PID:2312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 846⤵
- Program crash
PID:4824
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe/stext "C:\Users\Admin\AppData\Roaming\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\ecbhzrooc1.txt"5⤵
- Accesses Microsoft Outlook accounts
PID:4992
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe/stext "C:\Users\Admin\AppData\Roaming\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\ecbhzrooc2.txt"5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe/stext "C:\Users\Admin\AppData\Roaming\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\ecbhzrooc3.txt"5⤵PID:3328
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe/stext "C:\Users\Admin\AppData\Roaming\Y1F5W2I0-W6V4-G5S1-T8J1-U5Y8L0K337W4\ecbhzrooc4.txt"5⤵PID:1452
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2312 -ip 23121⤵PID:2416
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD5350dfc66657d2d9b2231bf8bfe33497b
SHA10fb28b28c416d21f1db2d54355e89fa8ec3e3324
SHA256a2bb808321745ce0239b5a84c78a801644d903ce8a6ab87193337aaf2d01fc31
SHA512635132ff935ea13048839d2c535d5abbae53c77d332df7c7628dbbb5db94ffc3b5be7820bb116da94433d6c814b5b4b6811bcc32b22cae3adffb086664e010e5
-
Filesize
126KB
MD5350dfc66657d2d9b2231bf8bfe33497b
SHA10fb28b28c416d21f1db2d54355e89fa8ec3e3324
SHA256a2bb808321745ce0239b5a84c78a801644d903ce8a6ab87193337aaf2d01fc31
SHA512635132ff935ea13048839d2c535d5abbae53c77d332df7c7628dbbb5db94ffc3b5be7820bb116da94433d6c814b5b4b6811bcc32b22cae3adffb086664e010e5
-
Filesize
172KB
MD581912e3dd162ce7c96114a84d0d58b29
SHA12def8b1c48c9e550f57c9dab915c5232a7113d57
SHA256f91cf396d6cc0e3803aa25fd0770e9a252196ae616e032e4880668c8ded74dc0
SHA512893b3c4483d0a307cad24c73fce27bc4e02438439fc5b07d596146bdb92767e53e60642ff6264ce80891b10c0a7f2a3f5b397560a47ee6e1244d6e5e9a80f341
-
Filesize
172KB
MD581912e3dd162ce7c96114a84d0d58b29
SHA12def8b1c48c9e550f57c9dab915c5232a7113d57
SHA256f91cf396d6cc0e3803aa25fd0770e9a252196ae616e032e4880668c8ded74dc0
SHA512893b3c4483d0a307cad24c73fce27bc4e02438439fc5b07d596146bdb92767e53e60642ff6264ce80891b10c0a7f2a3f5b397560a47ee6e1244d6e5e9a80f341
-
Filesize
3KB
MD5f94dc819ca773f1e3cb27abbc9e7fa27
SHA19a7700efadc5ea09ab288544ef1e3cd876255086
SHA256a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92
SHA51272a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84