Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/11/2022, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
Payment Details.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Payment Details.exe
Resource
win10v2004-20220812-en
General
-
Target
Payment Details.exe
-
Size
752KB
-
MD5
6fbe7f72bad2def906f6fea64565588a
-
SHA1
96dce6df15dbafa0f45b4d63c44aa2eb2a4a5c9a
-
SHA256
0ce4d6e8ba3ba2d916a91b04d863bc33727ab419f3f8013b3cb610bd49a5b104
-
SHA512
4d92df8373ee37c9a37c217db6a01e15b75ee5e03cfabea03fd6aa914bfcc791f6f79771afcb739ceef0914e2f1846db5964752115bee91dd4901f879baa2c75
-
SSDEEP
12288:qsAgHtDg5xE1l2/NhqNRa9xDbP1Nh66YsQkyZuWI:R4B2ixDbNR4ZBI
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5484820495:AAGEjy8dT72vJZImmHLmeh3onMuG9LLRD5A/sendMessage?chat_id=5101327412
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 6 IoCs
resource yara_rule behavioral1/memory/1984-64-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1984-66-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1984-67-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1984-68-0x000000000042022E-mapping.dmp family_snakekeylogger behavioral1/memory/1984-70-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1984-72-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 752 set thread context of 1984 752 Payment Details.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 928 1984 WerFault.exe 30 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2000 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 752 Payment Details.exe 1984 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 752 Payment Details.exe Token: SeDebugPrivilege 1984 MSBuild.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 752 wrote to memory of 2000 752 Payment Details.exe 28 PID 752 wrote to memory of 2000 752 Payment Details.exe 28 PID 752 wrote to memory of 2000 752 Payment Details.exe 28 PID 752 wrote to memory of 2000 752 Payment Details.exe 28 PID 752 wrote to memory of 1984 752 Payment Details.exe 30 PID 752 wrote to memory of 1984 752 Payment Details.exe 30 PID 752 wrote to memory of 1984 752 Payment Details.exe 30 PID 752 wrote to memory of 1984 752 Payment Details.exe 30 PID 752 wrote to memory of 1984 752 Payment Details.exe 30 PID 752 wrote to memory of 1984 752 Payment Details.exe 30 PID 752 wrote to memory of 1984 752 Payment Details.exe 30 PID 752 wrote to memory of 1984 752 Payment Details.exe 30 PID 752 wrote to memory of 1984 752 Payment Details.exe 30 PID 1984 wrote to memory of 928 1984 MSBuild.exe 31 PID 1984 wrote to memory of 928 1984 MSBuild.exe 31 PID 1984 wrote to memory of 928 1984 MSBuild.exe 31 PID 1984 wrote to memory of 928 1984 MSBuild.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Details.exe"C:\Users\Admin\AppData\Local\Temp\Payment Details.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yWKCXqUaVx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7D2C.tmp"2⤵
- Creates scheduled task(s)
PID:2000
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 11243⤵
- Program crash
PID:928
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d9c1c938d5b88dedf9f7412e911b6db0
SHA1c82e46d9e549bfb9219dbe2b2fac4678bbd96c24
SHA256c2a9c781c2f1b1032a95d0ebddd62922d60915b2d923456fb8a1977b0db3aff3
SHA512fc351427d3dbf6ec9eb58ba56157b024c4a83fe41caa84068fd0e1c50fcfe2685773e5390357a652c6e5d6821defff1dc364077f0491af280c4d12d85c80f16f