Analysis
-
max time kernel
136s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10-02-2023 13:57
Static task
static1
Behavioral task
behavioral1
Sample
BELL210 AND ALLOUETTE III.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
BELL210 AND ALLOUETTE III.js
Resource
win10v2004-20220812-en
General
-
Target
BELL210 AND ALLOUETTE III.js
-
Size
8.8MB
-
MD5
dfb37335684d81ea565f5281c9a799e4
-
SHA1
ba58fc83b2a10b111c6db6ae31ee03cfd201b8fc
-
SHA256
e5a333dae12ac8664bcc0bd12b991ec8095256e4aaf15f6afeb5b014e70146ed
-
SHA512
e055886a61b86402a3ed136fa33bda70106b6904e4c2b4a6b1f685923c281f2f1a66ee1dea0f589f7b0de52498d40b56825a892c09effbbabd527bd72825433b
-
SSDEEP
3072:AiePnmJZBc9hVWQlxlclBwd0PGGGUSJREQX4ULG9LbuewHVP3eJuR0RfuzkQYhsY:V
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5958393772:AAGyX-afxRqNUOVdPT528XtfkgekWKm1kNE/sendMessage?chat_id=1407227065
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 3 IoCs
resource yara_rule behavioral2/files/0x0007000000022e2e-136.dat family_snakekeylogger behavioral2/files/0x0007000000022e2e-137.dat family_snakekeylogger behavioral2/memory/4832-138-0x00000000001E0000-0x0000000000206000-memory.dmp family_snakekeylogger -
Blocklisted process makes network request 5 IoCs
flow pid Process 17 5032 wscript.exe 39 5032 wscript.exe 52 5032 wscript.exe 56 5032 wscript.exe 60 5032 wscript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QBFewEVTLk.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QBFewEVTLk.js wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 4832 DUTYGRACE1.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DUTYGRACE1.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DUTYGRACE1.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DUTYGRACE1.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 checkip.dyndns.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4832 DUTYGRACE1.exe 4832 DUTYGRACE1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4832 DUTYGRACE1.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1532 wrote to memory of 5032 1532 wscript.exe 81 PID 1532 wrote to memory of 5032 1532 wscript.exe 81 PID 1532 wrote to memory of 4832 1532 wscript.exe 82 PID 1532 wrote to memory of 4832 1532 wscript.exe 82 PID 1532 wrote to memory of 4832 1532 wscript.exe 82 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DUTYGRACE1.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DUTYGRACE1.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\BELL210 AND ALLOUETTE III.js"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\QBFewEVTLk.js"2⤵
- Blocklisted process makes network request
- Drops startup file
PID:5032
-
-
C:\Users\Admin\AppData\Roaming\DUTYGRACE1.exe"C:\Users\Admin\AppData\Roaming\DUTYGRACE1.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4832
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD50f6feb76652ce94eb9f69ca25996ff0c
SHA130aef62f9aeff234e5a751bb7bcdd91f90edbefb
SHA2562b73794839ef377a2a8bc67263a2b706cec30ac5d90cdf372ee2eaeeb0eb4bc7
SHA512910c17a265a8ce17c6f4798fd70be17cc2089e9b84435e408ed6886cee3b699013b27d42d3a91eddb0c9acb648f1b0f3f4c1521bdaa1cf63f7454349d100da62
-
Filesize
127KB
MD50f6feb76652ce94eb9f69ca25996ff0c
SHA130aef62f9aeff234e5a751bb7bcdd91f90edbefb
SHA2562b73794839ef377a2a8bc67263a2b706cec30ac5d90cdf372ee2eaeeb0eb4bc7
SHA512910c17a265a8ce17c6f4798fd70be17cc2089e9b84435e408ed6886cee3b699013b27d42d3a91eddb0c9acb648f1b0f3f4c1521bdaa1cf63f7454349d100da62
-
Filesize
1.1MB
MD5893f41a7e7737649381e8f4992a1dff6
SHA12b3c8f5cd84b1f4ef28568fe9b45ed5f86144ab4
SHA25671ace751f1e01a97aa5fef9ac924d0f2c6aeb7b1788d25ea47e069b13c0b85a3
SHA5121145852ccc47ba5f608fbb771b01623cb2dd74d64a34e0cd8e29647fa3c34f8bbaa456c29d0fe906aa85899fd8d2eae46fb32e65e9e11586c1e11bfd9944834f