Analysis
-
max time kernel
115s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2022, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
SHIPPING ADVICE DOCUMENTS.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SHIPPING ADVICE DOCUMENTS.exe
Resource
win10v2004-20220812-en
General
-
Target
SHIPPING ADVICE DOCUMENTS.exe
-
Size
283KB
-
MD5
a603a0b33ff50d3adfd91876cb4ecefe
-
SHA1
f17bb4f82bcf83fc468aace44fd7969e0d2c9a20
-
SHA256
12bb824400a388060ec52b7f66dcd99c12481f2936c57088c6b97427cc4b9e7c
-
SHA512
0e6a13a1c0afed0b8919b13fd1de8ecafad4c5a970b96d9faad41aaef34f5233b378c3cc2a43b47e9b8cfd9a6bebeef8b86633ee855563fcefdc8d7c8a4a1525
-
SSDEEP
6144:kKbho0Z3DqJHI7WsKmeNmIB/iLGmXbmmq58EG8pG776xG:kKbho0ZDqVIWpmfIExiaYG77
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5515611206:AAEcQSX8hXHOAxSYr8KUdLxGF5eqw4FRXoA/sendMessage?chat_id=1504449137
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 2 IoCs
resource yara_rule behavioral2/memory/3208-133-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral2/memory/3208-135-0x000000000042012E-mapping.dmp family_snakekeylogger -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 536 set thread context of 3208 536 SHIPPING ADVICE DOCUMENTS.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 1264 3208 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 536 SHIPPING ADVICE DOCUMENTS.exe 536 SHIPPING ADVICE DOCUMENTS.exe 3208 CasPol.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 536 SHIPPING ADVICE DOCUMENTS.exe Token: SeDebugPrivilege 3208 CasPol.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 536 wrote to memory of 3008 536 SHIPPING ADVICE DOCUMENTS.exe 82 PID 536 wrote to memory of 3008 536 SHIPPING ADVICE DOCUMENTS.exe 82 PID 536 wrote to memory of 3008 536 SHIPPING ADVICE DOCUMENTS.exe 82 PID 536 wrote to memory of 3208 536 SHIPPING ADVICE DOCUMENTS.exe 83 PID 536 wrote to memory of 3208 536 SHIPPING ADVICE DOCUMENTS.exe 83 PID 536 wrote to memory of 3208 536 SHIPPING ADVICE DOCUMENTS.exe 83 PID 536 wrote to memory of 3208 536 SHIPPING ADVICE DOCUMENTS.exe 83 PID 536 wrote to memory of 3208 536 SHIPPING ADVICE DOCUMENTS.exe 83 PID 536 wrote to memory of 3208 536 SHIPPING ADVICE DOCUMENTS.exe 83 PID 536 wrote to memory of 3208 536 SHIPPING ADVICE DOCUMENTS.exe 83 PID 536 wrote to memory of 3208 536 SHIPPING ADVICE DOCUMENTS.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\SHIPPING ADVICE DOCUMENTS.exe"C:\Users\Admin\AppData\Local\Temp\SHIPPING ADVICE DOCUMENTS.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵PID:3008
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 16363⤵
- Program crash
PID:1264
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3208 -ip 32081⤵PID:3636