Analysis

  • max time kernel
    100s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    18-01-2023 14:43

General

  • Target

    bad.docx

  • Size

    10KB

  • MD5

    7818486ac86d9e339c78c637319bcf0d

  • SHA1

    03c4bbfed5eb789ab69ffe0724c4f5ae8532850f

  • SHA256

    dff468b73da99e8cf124bea61b6a154b9d3bf716301db54b6df0b7af30450c7d

  • SHA512

    e5a0d0679eade2e103e1b85260c883c8bbc313cb382e6eace9876aadfcd365a04a94b7a35c343ace7d5d2dcc5603df3c40b23a7024336301460e4099de61e54c

  • SSDEEP

    192:ScIMmtP8ar5G/bfIdTOtznamWBX8ex6y3+LN:SPXt4ATOtznosM+5

Malware Config

Extracted

Family

snakekeylogger

Credentials
C2

https://api.telegram.org/bot5814180506:AAFpVfxl9CBszzsUeg8FTylBwiTKUc4g3lA/sendMessage?chat_id=5056270248

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 6 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bad.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1264
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1324
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1872
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FoxPTQ.exe"
          3⤵
            PID:908
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FoxPTQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp20DA.tmp"
            3⤵
            • Creates scheduled task(s)
            PID:1600
          • C:\Users\Public\vbc.exe
            "C:\Users\Public\vbc.exe"
            3⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:516

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scripting

      1
      T1064

      Scheduled Task

      1
      T1053

      Exploitation for Client Execution

      1
      T1203

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Scripting

      1
      T1064

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      3
      T1081

      Discovery

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      3
      T1005

      Email Collection

      1
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmp20DA.tmp
        Filesize

        1KB

        MD5

        6bff89d53d6984916bdaf505bb62c2ec

        SHA1

        07a4101aadb3114ef24874fd1dcf55a04d6995ef

        SHA256

        5fc00b14ae3c4410df54d4080d95ef6dca38a9f5093f5ecdbd9920085846a5b2

        SHA512

        52b9f35e6f39581df4969fa170928825f00057a3ca83ff584223a4c9c4d4a4dffcb2a67b66bbcc804159abd6babd8b6bb3a0275a7c8287f204d2b6b2abcbb6f1

      • C:\Users\Public\vbc.exe
        Filesize

        646KB

        MD5

        e0eb438ec9af17930f7a74fad78309db

        SHA1

        63a5d72a650237f4215484342b1a8e92cc5322ca

        SHA256

        f28cf8edc5bd4769e5eb62ff5d1e48280307063db04e48cbeabdc6ea51cff74e

        SHA512

        6725a9d3a8171db9cf0719f274ba0a6e5db6e386eb6c9c56fa82d70f691f314e1cd08cb308b8d89464cea8350339f2a2a4b3fc449f37e203765bfe4472a2aa40

      • C:\Users\Public\vbc.exe
        Filesize

        646KB

        MD5

        e0eb438ec9af17930f7a74fad78309db

        SHA1

        63a5d72a650237f4215484342b1a8e92cc5322ca

        SHA256

        f28cf8edc5bd4769e5eb62ff5d1e48280307063db04e48cbeabdc6ea51cff74e

        SHA512

        6725a9d3a8171db9cf0719f274ba0a6e5db6e386eb6c9c56fa82d70f691f314e1cd08cb308b8d89464cea8350339f2a2a4b3fc449f37e203765bfe4472a2aa40

      • C:\Users\Public\vbc.exe
        Filesize

        646KB

        MD5

        e0eb438ec9af17930f7a74fad78309db

        SHA1

        63a5d72a650237f4215484342b1a8e92cc5322ca

        SHA256

        f28cf8edc5bd4769e5eb62ff5d1e48280307063db04e48cbeabdc6ea51cff74e

        SHA512

        6725a9d3a8171db9cf0719f274ba0a6e5db6e386eb6c9c56fa82d70f691f314e1cd08cb308b8d89464cea8350339f2a2a4b3fc449f37e203765bfe4472a2aa40

      • \Users\Public\vbc.exe
        Filesize

        646KB

        MD5

        e0eb438ec9af17930f7a74fad78309db

        SHA1

        63a5d72a650237f4215484342b1a8e92cc5322ca

        SHA256

        f28cf8edc5bd4769e5eb62ff5d1e48280307063db04e48cbeabdc6ea51cff74e

        SHA512

        6725a9d3a8171db9cf0719f274ba0a6e5db6e386eb6c9c56fa82d70f691f314e1cd08cb308b8d89464cea8350339f2a2a4b3fc449f37e203765bfe4472a2aa40

      • memory/516-77-0x0000000000400000-0x0000000000426000-memory.dmp
        Filesize

        152KB

      • memory/516-88-0x0000000000400000-0x0000000000426000-memory.dmp
        Filesize

        152KB

      • memory/516-86-0x0000000000400000-0x0000000000426000-memory.dmp
        Filesize

        152KB

      • memory/516-82-0x0000000000400000-0x0000000000426000-memory.dmp
        Filesize

        152KB

      • memory/516-83-0x000000000042079E-mapping.dmp
      • memory/516-81-0x0000000000400000-0x0000000000426000-memory.dmp
        Filesize

        152KB

      • memory/516-79-0x0000000000400000-0x0000000000426000-memory.dmp
        Filesize

        152KB

      • memory/516-76-0x0000000000400000-0x0000000000426000-memory.dmp
        Filesize

        152KB

      • memory/908-72-0x0000000000000000-mapping.dmp
      • memory/1264-66-0x0000000000000000-mapping.dmp
      • memory/1264-68-0x000007FEFB7F1000-0x000007FEFB7F3000-memory.dmp
        Filesize

        8KB

      • memory/1516-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1516-57-0x0000000075111000-0x0000000075113000-memory.dmp
        Filesize

        8KB

      • memory/1516-59-0x0000000070BAD000-0x0000000070BB8000-memory.dmp
        Filesize

        44KB

      • memory/1516-91-0x0000000070BAD000-0x0000000070BB8000-memory.dmp
        Filesize

        44KB

      • memory/1516-54-0x0000000072141000-0x0000000072144000-memory.dmp
        Filesize

        12KB

      • memory/1516-90-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1516-58-0x0000000070BAD000-0x0000000070BB8000-memory.dmp
        Filesize

        44KB

      • memory/1516-55-0x000000006FBC1000-0x000000006FBC3000-memory.dmp
        Filesize

        8KB

      • memory/1600-73-0x0000000000000000-mapping.dmp
      • memory/1872-71-0x0000000004450000-0x00000000044B0000-memory.dmp
        Filesize

        384KB

      • memory/1872-65-0x0000000000840000-0x00000000008E8000-memory.dmp
        Filesize

        672KB

      • memory/1872-62-0x0000000000000000-mapping.dmp
      • memory/1872-69-0x0000000000470000-0x0000000000486000-memory.dmp
        Filesize

        88KB

      • memory/1872-70-0x0000000000480000-0x000000000048A000-memory.dmp
        Filesize

        40KB

      • memory/1872-75-0x00000000051E0000-0x0000000005206000-memory.dmp
        Filesize

        152KB