Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2023, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
a61aab7a91f7dba66c5e68fafcf07d6e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a61aab7a91f7dba66c5e68fafcf07d6e.exe
Resource
win10v2004-20220812-en
General
-
Target
a61aab7a91f7dba66c5e68fafcf07d6e.exe
-
Size
428KB
-
MD5
a61aab7a91f7dba66c5e68fafcf07d6e
-
SHA1
1b1f8acc390b92b0d6ce0f84f7411bc832130c9a
-
SHA256
5e27ca499161ff3764f1e5456c47849c2f291d21ba4103ea5b03eff657e869e6
-
SHA512
0ff0b8b0f8fa5a1d587845f7382fdcc818dc3646b7325b49eaa9a93a98e2b3376c51e4b2a72ff31365d13d63f237f0150a98e3850c3006fc7f0879ed6f32bee0
-
SSDEEP
12288:zyq7Njv/AyRBFTj3a03eHwcQXO7nq1jmkpFB:RdvZRB5aPwcQe+1JB
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
pro40.emailserver.vn - Port:
587 - Username:
[email protected] - Password:
Vexa@2013
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 checkip.dyndns.org 7 freegeoip.app 8 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3036 set thread context of 4992 3036 a61aab7a91f7dba66c5e68fafcf07d6e.exe 82 -
Program crash 1 IoCs
pid pid_target Process procid_target 3940 4992 WerFault.exe 82 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5024 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4992 MSBuild.exe 4992 MSBuild.exe 4992 MSBuild.exe 4992 MSBuild.exe 4992 MSBuild.exe 4992 MSBuild.exe 4992 MSBuild.exe 4992 MSBuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3036 a61aab7a91f7dba66c5e68fafcf07d6e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4992 MSBuild.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3036 wrote to memory of 5052 3036 a61aab7a91f7dba66c5e68fafcf07d6e.exe 81 PID 3036 wrote to memory of 5052 3036 a61aab7a91f7dba66c5e68fafcf07d6e.exe 81 PID 3036 wrote to memory of 5052 3036 a61aab7a91f7dba66c5e68fafcf07d6e.exe 81 PID 3036 wrote to memory of 4992 3036 a61aab7a91f7dba66c5e68fafcf07d6e.exe 82 PID 3036 wrote to memory of 4992 3036 a61aab7a91f7dba66c5e68fafcf07d6e.exe 82 PID 3036 wrote to memory of 4992 3036 a61aab7a91f7dba66c5e68fafcf07d6e.exe 82 PID 3036 wrote to memory of 4992 3036 a61aab7a91f7dba66c5e68fafcf07d6e.exe 82 PID 5052 wrote to memory of 5024 5052 cmd.exe 83 PID 5052 wrote to memory of 5024 5052 cmd.exe 83 PID 5052 wrote to memory of 5024 5052 cmd.exe 83 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a61aab7a91f7dba66c5e68fafcf07d6e.exe"C:\Users\Admin\AppData\Local\Temp\a61aab7a91f7dba66c5e68fafcf07d6e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\cmd.execmd /c schtasks /Create /TN name /XML "C:\Users\Admin\AppData\Local\Temp\64a93f59b5894fd5b0d60f9f52db3822.xml"2⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN name /XML "C:\Users\Admin\AppData\Local\Temp\64a93f59b5894fd5b0d60f9f52db3822.xml"3⤵
- Creates scheduled task(s)
PID:5024
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\a61aab7a91f7dba66c5e68fafcf07d6e.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 17883⤵
- Program crash
PID:3940
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4992 -ip 49921⤵PID:540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52feaac3555165aa7b76fabc3984fe19b
SHA176710b1b204309f4d057eba17bba71b7444f52af
SHA25668052979b38f028b24e466114471d2d49568b83a9a7f051a82a72c5ca4e8c01c
SHA51281cf57a2ad53f9eaf9a21799dc87e7846a1669a370e05597f58ffb87a91f8f38814375e675880a6d9cdb5bb667d47cb875e6fb471d9a9b143f81a83e6f5b6739