Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 19:18

General

  • Target

    Agents Letter.exe

  • Size

    430KB

  • MD5

    2c27fdafaa47f61b79d8b5513c8e4d23

  • SHA1

    262e6cb688ad062bdde2b6702871a5a07e4409f4

  • SHA256

    6b1ee9252cc101156e585e7cd6c59ea3850a010c57a7f1b1915d5438cbc5b4de

  • SHA512

    d3fdfb89c23329e36a2c043a8159bf8816e2a0c8df432dc407f9c45f3c8b1f2c719c9a57c028ed7c81154c72fcb66147c223d25c73ef77a66a9114024444aa24

  • SSDEEP

    3072:w9Op4I8ZZpSOs4PNdvr+1UjTsvY3h4I5UWIDRRineV3Kap/ObYOOt7POITGCotdK:WIMZUOJpq1B4UhDqe5pmboNNPonA4

Malware Config

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Agents Letter.exe
    "C:\Users\Admin\AppData\Local\Temp\Agents Letter.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4468
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1080
    • C:\Users\Admin\AppData\Local\Temp\Agents Letter.exe
      "C:\Users\Admin\AppData\Local\Temp\Agents Letter.exe"
      2⤵
        PID:428
      • C:\Users\Admin\AppData\Local\Temp\Agents Letter.exe
        "C:\Users\Admin\AppData\Local\Temp\Agents Letter.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5008

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Agents Letter.exe.log
      Filesize

      1KB

      MD5

      026fb31495d30e5dbfd00f398c2efbf8

      SHA1

      9cda8f5f58129e4d592ca1b9867835c86f38ab1b

      SHA256

      b008f16eeae90b4c6ba119fb308616c0795cdaca51adf2b64470a0c01aeeb8b7

      SHA512

      6d1cc01c90613522cfb7be7ea67ff03732b367dfc7bfd245ad6d7ea8e5e5def431b3339d17893b7b193cee2c3b4c22a459acd3d852ee88fce711e30c5af195a1

    • memory/428-144-0x0000000000000000-mapping.dmp
    • memory/1080-136-0x0000000000000000-mapping.dmp
    • memory/1080-141-0x0000000005BF0000-0x0000000005C0E000-memory.dmp
      Filesize

      120KB

    • memory/1080-143-0x0000000006190000-0x00000000061AA000-memory.dmp
      Filesize

      104KB

    • memory/1080-137-0x00000000022E0000-0x0000000002316000-memory.dmp
      Filesize

      216KB

    • memory/1080-138-0x0000000004F70000-0x0000000005598000-memory.dmp
      Filesize

      6.2MB

    • memory/1080-139-0x0000000004D50000-0x0000000004DB6000-memory.dmp
      Filesize

      408KB

    • memory/1080-140-0x00000000055A0000-0x0000000005606000-memory.dmp
      Filesize

      408KB

    • memory/1080-142-0x00000000074F0000-0x0000000007B6A000-memory.dmp
      Filesize

      6.5MB

    • memory/4468-135-0x0000000005ED0000-0x0000000005EF2000-memory.dmp
      Filesize

      136KB

    • memory/4468-132-0x0000000000630000-0x00000000006A2000-memory.dmp
      Filesize

      456KB

    • memory/4468-134-0x0000000006450000-0x00000000069F4000-memory.dmp
      Filesize

      5.6MB

    • memory/4468-133-0x0000000005E00000-0x0000000005E92000-memory.dmp
      Filesize

      584KB

    • memory/5008-145-0x0000000000000000-mapping.dmp
    • memory/5008-146-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/5008-148-0x0000000005540000-0x00000000055DC000-memory.dmp
      Filesize

      624KB