Analysis
-
max time kernel
55s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-02-2023 14:28
Static task
static1
Behavioral task
behavioral1
Sample
fc6ae69175a3b839356a285e8917cdcd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fc6ae69175a3b839356a285e8917cdcd.exe
Resource
win10v2004-20221111-en
General
-
Target
fc6ae69175a3b839356a285e8917cdcd.exe
-
Size
858KB
-
MD5
fc6ae69175a3b839356a285e8917cdcd
-
SHA1
4df6d0bc48af8c06db5ff8bcd32d8797e6748d54
-
SHA256
242e3afa42a4b6ecbe015e0d0a2786c42a24167e05a12f380f6e63af24d8c4e2
-
SHA512
1c319b72454bca09b7c7b34b36d7dce7a768d05a05a77b3cd727887a8fc3c535bb21a4705a2daa18df57098881429ec057ef861daa8465320f691c9bdb12cdd3
-
SSDEEP
12288:hSaE8R724XFHQOGYiFd07AKcSv8hvtFr8z9i7+pv7c4N34X/4pBFB5r61KAspot4:gP8RacFwHUxc1hvfr8zw6R7c4N34g
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
olgaecs.com - Port:
587 - Username:
[email protected] - Password:
0zukpdS7Pgug
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 6 IoCs
resource yara_rule behavioral1/memory/1412-63-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1412-65-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1412-66-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1412-67-0x00000000004206DE-mapping.dmp family_snakekeylogger behavioral1/memory/1412-69-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1412-71-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc6ae69175a3b839356a285e8917cdcd.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc6ae69175a3b839356a285e8917cdcd.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc6ae69175a3b839356a285e8917cdcd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2036 set thread context of 1412 2036 fc6ae69175a3b839356a285e8917cdcd.exe 29 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2036 fc6ae69175a3b839356a285e8917cdcd.exe 1412 fc6ae69175a3b839356a285e8917cdcd.exe 1412 fc6ae69175a3b839356a285e8917cdcd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2036 fc6ae69175a3b839356a285e8917cdcd.exe Token: SeDebugPrivilege 1412 fc6ae69175a3b839356a285e8917cdcd.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1748 2036 fc6ae69175a3b839356a285e8917cdcd.exe 28 PID 2036 wrote to memory of 1748 2036 fc6ae69175a3b839356a285e8917cdcd.exe 28 PID 2036 wrote to memory of 1748 2036 fc6ae69175a3b839356a285e8917cdcd.exe 28 PID 2036 wrote to memory of 1748 2036 fc6ae69175a3b839356a285e8917cdcd.exe 28 PID 2036 wrote to memory of 1412 2036 fc6ae69175a3b839356a285e8917cdcd.exe 29 PID 2036 wrote to memory of 1412 2036 fc6ae69175a3b839356a285e8917cdcd.exe 29 PID 2036 wrote to memory of 1412 2036 fc6ae69175a3b839356a285e8917cdcd.exe 29 PID 2036 wrote to memory of 1412 2036 fc6ae69175a3b839356a285e8917cdcd.exe 29 PID 2036 wrote to memory of 1412 2036 fc6ae69175a3b839356a285e8917cdcd.exe 29 PID 2036 wrote to memory of 1412 2036 fc6ae69175a3b839356a285e8917cdcd.exe 29 PID 2036 wrote to memory of 1412 2036 fc6ae69175a3b839356a285e8917cdcd.exe 29 PID 2036 wrote to memory of 1412 2036 fc6ae69175a3b839356a285e8917cdcd.exe 29 PID 2036 wrote to memory of 1412 2036 fc6ae69175a3b839356a285e8917cdcd.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc6ae69175a3b839356a285e8917cdcd.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc6ae69175a3b839356a285e8917cdcd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc6ae69175a3b839356a285e8917cdcd.exe"C:\Users\Admin\AppData\Local\Temp\fc6ae69175a3b839356a285e8917cdcd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\fc6ae69175a3b839356a285e8917cdcd.exe"C:\Users\Admin\AppData\Local\Temp\fc6ae69175a3b839356a285e8917cdcd.exe"2⤵PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\fc6ae69175a3b839356a285e8917cdcd.exe"C:\Users\Admin\AppData\Local\Temp\fc6ae69175a3b839356a285e8917cdcd.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1412
-