Analysis
-
max time kernel
180s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 07:44
Static task
static1
Behavioral task
behavioral1
Sample
224c2921f5732b06fa7fc6224adfbc94.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
224c2921f5732b06fa7fc6224adfbc94.exe
Resource
win10v2004-20221111-en
General
-
Target
224c2921f5732b06fa7fc6224adfbc94.exe
-
Size
636KB
-
MD5
224c2921f5732b06fa7fc6224adfbc94
-
SHA1
e3abef33761330122f1caf42e2cd1bbed381e53b
-
SHA256
01856301804ce957c8ad34242cc6616a26fb17a245e65f7507d36aea4d54692f
-
SHA512
29dd249a5a4eb6dcb737656cf473c9312f96de2788f87f6c967efdabc82f9e3ebdd8816961710701b173401ab43c027e124995f3b3ddb437b2c185113140cfd6
-
SSDEEP
12288:LKeqOgh/PsZ1DX/VDJaccEjklQ2sxFkQSuMA5vBLG0:LgOgh/PBEwlUxLSuzJLG0
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3328-138-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 74 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
224c2921f5732b06fa7fc6224adfbc94.exedescription pid process target process PID 404 set thread context of 3328 404 224c2921f5732b06fa7fc6224adfbc94.exe 224c2921f5732b06fa7fc6224adfbc94.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
224c2921f5732b06fa7fc6224adfbc94.exepid process 3328 224c2921f5732b06fa7fc6224adfbc94.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
224c2921f5732b06fa7fc6224adfbc94.exedescription pid process Token: SeDebugPrivilege 3328 224c2921f5732b06fa7fc6224adfbc94.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
224c2921f5732b06fa7fc6224adfbc94.exedescription pid process target process PID 404 wrote to memory of 3328 404 224c2921f5732b06fa7fc6224adfbc94.exe 224c2921f5732b06fa7fc6224adfbc94.exe PID 404 wrote to memory of 3328 404 224c2921f5732b06fa7fc6224adfbc94.exe 224c2921f5732b06fa7fc6224adfbc94.exe PID 404 wrote to memory of 3328 404 224c2921f5732b06fa7fc6224adfbc94.exe 224c2921f5732b06fa7fc6224adfbc94.exe PID 404 wrote to memory of 3328 404 224c2921f5732b06fa7fc6224adfbc94.exe 224c2921f5732b06fa7fc6224adfbc94.exe PID 404 wrote to memory of 3328 404 224c2921f5732b06fa7fc6224adfbc94.exe 224c2921f5732b06fa7fc6224adfbc94.exe PID 404 wrote to memory of 3328 404 224c2921f5732b06fa7fc6224adfbc94.exe 224c2921f5732b06fa7fc6224adfbc94.exe PID 404 wrote to memory of 3328 404 224c2921f5732b06fa7fc6224adfbc94.exe 224c2921f5732b06fa7fc6224adfbc94.exe PID 404 wrote to memory of 3328 404 224c2921f5732b06fa7fc6224adfbc94.exe 224c2921f5732b06fa7fc6224adfbc94.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\224c2921f5732b06fa7fc6224adfbc94.exe"C:\Users\Admin\AppData\Local\Temp\224c2921f5732b06fa7fc6224adfbc94.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\224c2921f5732b06fa7fc6224adfbc94.exe"C:\Users\Admin\AppData\Local\Temp\224c2921f5732b06fa7fc6224adfbc94.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3328