Analysis
-
max time kernel
92s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2022 14:13
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order no. P212576.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Purchase Order no. P212576.exe
Resource
win10v2004-20220812-en
General
-
Target
Purchase Order no. P212576.exe
-
Size
850KB
-
MD5
1311f07dc42fd9b1a7d078302a6fa19d
-
SHA1
76279eab3809d9f7cf3c65ee6c3d349452905de8
-
SHA256
b6abfeb2f4b5b9b41a34dd97806c12c49acc96e6f08115a7a7f9a5dd0a1db7ba
-
SHA512
f82ea7db97b5a76824c8451b0d1cf50604891f37fce4e115cc30a760e33491a1de52ae167c1d2b516db2c43ced483a5b74067fb0545c1e233f08532a06bb7290
-
SSDEEP
12288:PR8J2uT7cs+OJG4XfZaALFruvQIUfDj5E+gCUKCRWOxs:5lAQsbJG4XfIALFy4IC53CRF
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
29mj4rLzNN^G - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/2784-140-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Order no. P212576.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Order no. P212576.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Order no. P212576.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4916 set thread context of 2784 4916 Purchase Order no. P212576.exe 91 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4916 Purchase Order no. P212576.exe 4916 Purchase Order no. P212576.exe 2784 Purchase Order no. P212576.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4916 Purchase Order no. P212576.exe Token: SeDebugPrivilege 2784 Purchase Order no. P212576.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4916 wrote to memory of 4968 4916 Purchase Order no. P212576.exe 90 PID 4916 wrote to memory of 4968 4916 Purchase Order no. P212576.exe 90 PID 4916 wrote to memory of 4968 4916 Purchase Order no. P212576.exe 90 PID 4916 wrote to memory of 2784 4916 Purchase Order no. P212576.exe 91 PID 4916 wrote to memory of 2784 4916 Purchase Order no. P212576.exe 91 PID 4916 wrote to memory of 2784 4916 Purchase Order no. P212576.exe 91 PID 4916 wrote to memory of 2784 4916 Purchase Order no. P212576.exe 91 PID 4916 wrote to memory of 2784 4916 Purchase Order no. P212576.exe 91 PID 4916 wrote to memory of 2784 4916 Purchase Order no. P212576.exe 91 PID 4916 wrote to memory of 2784 4916 Purchase Order no. P212576.exe 91 PID 4916 wrote to memory of 2784 4916 Purchase Order no. P212576.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Order no. P212576.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Purchase Order no. P212576.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order no. P212576.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order no. P212576.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order no. P212576.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order no. P212576.exe"2⤵PID:4968
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order no. P212576.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order no. P212576.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2784
-