Overview
overview
10Static
static
100014c57bfd...3b.exe
windows7-x64
100014c57bfd...3b.exe
windows10-2004-x64
10660e3fcc23...81.exe
windows7-x64
7660e3fcc23...81.exe
windows10-2004-x64
79dc5600bed...30.exe
windows7-x64
109dc5600bed...30.exe
windows10-2004-x64
10Acwpn.exe
windows7-x64
10Acwpn.exe
windows10-2004-x64
7DHL SHIPPI...DF.exe
windows7-x64
10DHL SHIPPI...DF.exe
windows10-2004-x64
10Halkbank_E...f..exe
windows7-x64
10Halkbank_E...f..exe
windows10-2004-x64
10INVOICEXAN...LS.rtf
windows7-x64
10INVOICEXAN...LS.rtf
windows10-2004-x64
1Maersk Shi...cs.exe
windows7-x64
10Maersk Shi...cs.exe
windows10-2004-x64
10ORDER INQU...01.exe
windows7-x64
10ORDER INQU...01.exe
windows10-2004-x64
10PO-8372929.xls
windows7-x64
10PO-8372929.xls
windows10-2004-x64
1QUOTATION 1.rtf
windows7-x64
10QUOTATION 1.rtf
windows10-2004-x64
1Quotation.rtf
windows7-x64
10Quotation.rtf
windows10-2004-x64
1e1cf593726...1b.exe
windows7-x64
10e1cf593726...1b.exe
windows10-2004-x64
10macintosh.xlsx
windows7-x64
10macintosh.xlsx
windows10-2004-x64
1Resubmissions
01-02-2023 17:02
230201-vj6p3aah39 1001-02-2023 17:00
230201-vjf5eacg4s 1001-02-2023 16:57
230201-vgbrxacg2y 10Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-02-2023 16:57
Behavioral task
behavioral1
Sample
0014c57bfd62d2929bbad91d67b77c3b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0014c57bfd62d2929bbad91d67b77c3b.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
660e3fcc23c3a833e6e8af22b13ebd81.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
660e3fcc23c3a833e6e8af22b13ebd81.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
9dc5600bedda76a29aa0e33da951fc30.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
9dc5600bedda76a29aa0e33da951fc30.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
Acwpn.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
Acwpn.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
DHL SHIPPING DOC PDF.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
DHL SHIPPING DOC PDF.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
Halkbank_Ekstre_20230129_075423_612150o.pdf..exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
Halkbank_Ekstre_20230129_075423_612150o.pdf..exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
INVOICEXANDXBANKXDETAILS.rtf
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
INVOICEXANDXBANKXDETAILS.rtf
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
Maersk Shipping Docs.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
Maersk Shipping Docs.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
ORDER INQUIRY 20230201.exe
Resource
win7-20220901-en
Behavioral task
behavioral18
Sample
ORDER INQUIRY 20230201.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
PO-8372929.xls
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
PO-8372929.xls
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
QUOTATION 1.rtf
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
QUOTATION 1.rtf
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
Quotation.rtf
Resource
win7-20220901-en
Behavioral task
behavioral24
Sample
Quotation.rtf
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
e1cf59372694c7d46d84d0139b40d41b.exe
Resource
win7-20221111-en
Behavioral task
behavioral26
Sample
e1cf59372694c7d46d84d0139b40d41b.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
macintosh.xlsx
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
macintosh.xlsx
Resource
win10v2004-20221111-en
General
-
Target
9dc5600bedda76a29aa0e33da951fc30.exe
-
Size
504KB
-
MD5
9dc5600bedda76a29aa0e33da951fc30
-
SHA1
9daa8192ef8b03ee276de60e656a56b88ec2d074
-
SHA256
e966cd1651a960bc88f3582b328d274b2cbf2b84d59df761cbcd1702c38d5a14
-
SHA512
96e37c9a6342d09799138a97e1928d595aabf36ee5a250d7bba5c3397117a6bb0d19063cf305e1af6799aad6fbeb9257d429454340953203118fa288a0f74804
-
SSDEEP
12288:8RFO4oYvuoQouswXH06WAx5HSbr8z9i7+pvdCWtO:8TO4UdrE6J4r8zw6Rsh
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
ROe!AB$3
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 6 IoCs
resource yara_rule behavioral5/memory/1264-67-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral5/memory/1264-69-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral5/memory/1264-70-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral5/memory/1264-71-0x00000000004206DE-mapping.dmp family_snakekeylogger behavioral5/memory/1264-73-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral5/memory/1264-75-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1940 set thread context of 1264 1940 9dc5600bedda76a29aa0e33da951fc30.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1364 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1940 9dc5600bedda76a29aa0e33da951fc30.exe 1940 9dc5600bedda76a29aa0e33da951fc30.exe 1264 9dc5600bedda76a29aa0e33da951fc30.exe 1416 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1940 9dc5600bedda76a29aa0e33da951fc30.exe Token: SeDebugPrivilege 1264 9dc5600bedda76a29aa0e33da951fc30.exe Token: SeDebugPrivilege 1416 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1416 1940 9dc5600bedda76a29aa0e33da951fc30.exe 27 PID 1940 wrote to memory of 1416 1940 9dc5600bedda76a29aa0e33da951fc30.exe 27 PID 1940 wrote to memory of 1416 1940 9dc5600bedda76a29aa0e33da951fc30.exe 27 PID 1940 wrote to memory of 1416 1940 9dc5600bedda76a29aa0e33da951fc30.exe 27 PID 1940 wrote to memory of 1364 1940 9dc5600bedda76a29aa0e33da951fc30.exe 29 PID 1940 wrote to memory of 1364 1940 9dc5600bedda76a29aa0e33da951fc30.exe 29 PID 1940 wrote to memory of 1364 1940 9dc5600bedda76a29aa0e33da951fc30.exe 29 PID 1940 wrote to memory of 1364 1940 9dc5600bedda76a29aa0e33da951fc30.exe 29 PID 1940 wrote to memory of 1264 1940 9dc5600bedda76a29aa0e33da951fc30.exe 31 PID 1940 wrote to memory of 1264 1940 9dc5600bedda76a29aa0e33da951fc30.exe 31 PID 1940 wrote to memory of 1264 1940 9dc5600bedda76a29aa0e33da951fc30.exe 31 PID 1940 wrote to memory of 1264 1940 9dc5600bedda76a29aa0e33da951fc30.exe 31 PID 1940 wrote to memory of 1264 1940 9dc5600bedda76a29aa0e33da951fc30.exe 31 PID 1940 wrote to memory of 1264 1940 9dc5600bedda76a29aa0e33da951fc30.exe 31 PID 1940 wrote to memory of 1264 1940 9dc5600bedda76a29aa0e33da951fc30.exe 31 PID 1940 wrote to memory of 1264 1940 9dc5600bedda76a29aa0e33da951fc30.exe 31 PID 1940 wrote to memory of 1264 1940 9dc5600bedda76a29aa0e33da951fc30.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9dc5600bedda76a29aa0e33da951fc30.exe"C:\Users\Admin\AppData\Local\Temp\9dc5600bedda76a29aa0e33da951fc30.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UDBgQhSevZPJlf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UDBgQhSevZPJlf" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA796.tmp"2⤵
- Creates scheduled task(s)
PID:1364
-
-
C:\Users\Admin\AppData\Local\Temp\9dc5600bedda76a29aa0e33da951fc30.exe"C:\Users\Admin\AppData\Local\Temp\9dc5600bedda76a29aa0e33da951fc30.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54b7e4884267a971177d576b06d1267f7
SHA1718dbf22d2ee14bb0e2065ecdc8512a0f6bf4124
SHA2563148591c33714fc01f1c0c263d92db9b1c90dc459efa04590f43313e9c81b8a8
SHA512cdcd67fe7397ea44b42bc42da89eee2f1d97d31d8b1c02b74edf81243e570b1b6aaadc4dd6fd20991662cd82758a9eaa723178a6cfaa1df2d8310729e82319b2