Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2023, 17:14
Static task
static1
Behavioral task
behavioral1
Sample
qbOdWSNNuqquo2E.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
qbOdWSNNuqquo2E.exe
Resource
win10v2004-20230220-en
General
-
Target
qbOdWSNNuqquo2E.exe
-
Size
2.0MB
-
MD5
40c32c129e09d3eb618e27eb168aaadf
-
SHA1
6a35a5fa5a53ceba217c66562477e954aec8eb2b
-
SHA256
e09eaaa707261756f322c8d5b12af0a09c575ffbdd7bf19b895cab4982b7f68a
-
SHA512
72ba764a542f0f61b0375a37e646d7bbdb78ca2b1aabedd33a42472e5a8099211311d699161ba51f03db6a46481556644542f991e7ef443eec2721d093b7da48
-
SSDEEP
49152:6nsHyjtk2MYC5GDDMZEf4F0fVGJ2LxsL9ve049:6nsmtk2a1igSA2F0DU
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6241220793:AAFx6XFOw5z4Op7twC8hAqYib_mTz67Z4Ak/sendMessage?chat_id=2054148913
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 10 IoCs
resource yara_rule behavioral2/memory/1576-374-0x0000000000400000-0x00000000004E2000-memory.dmp family_snakekeylogger behavioral2/memory/1576-376-0x0000000000400000-0x00000000004E2000-memory.dmp family_snakekeylogger behavioral2/memory/1576-378-0x0000000000400000-0x00000000004E2000-memory.dmp family_snakekeylogger behavioral2/files/0x00060000000231a2-395.dat family_snakekeylogger behavioral2/memory/1576-442-0x0000000000400000-0x00000000004E2000-memory.dmp family_snakekeylogger behavioral2/files/0x00060000000231a2-453.dat family_snakekeylogger behavioral2/memory/1576-455-0x0000000000400000-0x00000000004E2000-memory.dmp family_snakekeylogger behavioral2/files/0x00060000000231a2-454.dat family_snakekeylogger behavioral2/memory/3988-456-0x0000000000790000-0x00000000007B6000-memory.dmp family_snakekeylogger behavioral2/memory/3988-485-0x0000000005360000-0x0000000005370000-memory.dmp family_snakekeylogger -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation qbOdWSNNuqquo2E.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation ._cache_qbOdWSNNuqquo2E.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation ._cache_qbOdWSNNuqquo2E.exe -
Executes dropped EXE 5 IoCs
pid Process 216 ._cache_qbOdWSNNuqquo2E.exe 1324 Synaptics.exe 2720 ._cache_Synaptics.exe 1576 ._cache_qbOdWSNNuqquo2E.exe 3988 ._cache_._cache_qbOdWSNNuqquo2E.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_qbOdWSNNuqquo2E.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_qbOdWSNNuqquo2E.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_qbOdWSNNuqquo2E.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" qbOdWSNNuqquo2E.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 53 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 216 set thread context of 1576 216 ._cache_qbOdWSNNuqquo2E.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1652 2720 WerFault.exe 84 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2008 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ qbOdWSNNuqquo2E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_qbOdWSNNuqquo2E.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4316 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3968 powershell.exe 3968 powershell.exe 3988 ._cache_._cache_qbOdWSNNuqquo2E.exe 3988 ._cache_._cache_qbOdWSNNuqquo2E.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3968 powershell.exe Token: SeDebugPrivilege 3988 ._cache_._cache_qbOdWSNNuqquo2E.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4316 EXCEL.EXE 4316 EXCEL.EXE 4316 EXCEL.EXE 4316 EXCEL.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1312 wrote to memory of 216 1312 qbOdWSNNuqquo2E.exe 82 PID 1312 wrote to memory of 216 1312 qbOdWSNNuqquo2E.exe 82 PID 1312 wrote to memory of 216 1312 qbOdWSNNuqquo2E.exe 82 PID 1312 wrote to memory of 1324 1312 qbOdWSNNuqquo2E.exe 83 PID 1312 wrote to memory of 1324 1312 qbOdWSNNuqquo2E.exe 83 PID 1312 wrote to memory of 1324 1312 qbOdWSNNuqquo2E.exe 83 PID 1324 wrote to memory of 2720 1324 Synaptics.exe 84 PID 1324 wrote to memory of 2720 1324 Synaptics.exe 84 PID 1324 wrote to memory of 2720 1324 Synaptics.exe 84 PID 216 wrote to memory of 3968 216 ._cache_qbOdWSNNuqquo2E.exe 95 PID 216 wrote to memory of 3968 216 ._cache_qbOdWSNNuqquo2E.exe 95 PID 216 wrote to memory of 3968 216 ._cache_qbOdWSNNuqquo2E.exe 95 PID 216 wrote to memory of 2008 216 ._cache_qbOdWSNNuqquo2E.exe 97 PID 216 wrote to memory of 2008 216 ._cache_qbOdWSNNuqquo2E.exe 97 PID 216 wrote to memory of 2008 216 ._cache_qbOdWSNNuqquo2E.exe 97 PID 216 wrote to memory of 1576 216 ._cache_qbOdWSNNuqquo2E.exe 100 PID 216 wrote to memory of 1576 216 ._cache_qbOdWSNNuqquo2E.exe 100 PID 216 wrote to memory of 1576 216 ._cache_qbOdWSNNuqquo2E.exe 100 PID 216 wrote to memory of 1576 216 ._cache_qbOdWSNNuqquo2E.exe 100 PID 216 wrote to memory of 1576 216 ._cache_qbOdWSNNuqquo2E.exe 100 PID 216 wrote to memory of 1576 216 ._cache_qbOdWSNNuqquo2E.exe 100 PID 216 wrote to memory of 1576 216 ._cache_qbOdWSNNuqquo2E.exe 100 PID 216 wrote to memory of 1576 216 ._cache_qbOdWSNNuqquo2E.exe 100 PID 216 wrote to memory of 1576 216 ._cache_qbOdWSNNuqquo2E.exe 100 PID 216 wrote to memory of 1576 216 ._cache_qbOdWSNNuqquo2E.exe 100 PID 216 wrote to memory of 1576 216 ._cache_qbOdWSNNuqquo2E.exe 100 PID 1576 wrote to memory of 3988 1576 ._cache_qbOdWSNNuqquo2E.exe 101 PID 1576 wrote to memory of 3988 1576 ._cache_qbOdWSNNuqquo2E.exe 101 PID 1576 wrote to memory of 3988 1576 ._cache_qbOdWSNNuqquo2E.exe 101 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_qbOdWSNNuqquo2E.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_qbOdWSNNuqquo2E.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\qbOdWSNNuqquo2E.exe"C:\Users\Admin\AppData\Local\Temp\qbOdWSNNuqquo2E.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\._cache_qbOdWSNNuqquo2E.exe"C:\Users\Admin\AppData\Local\Temp\._cache_qbOdWSNNuqquo2E.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\bRBgyCtm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bRBgyCtm" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3CCA.tmp"3⤵
- Creates scheduled task(s)
PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\._cache_qbOdWSNNuqquo2E.exe"C:\Users\Admin\AppData\Local\Temp\._cache_qbOdWSNNuqquo2E.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\._cache_._cache_qbOdWSNNuqquo2E.exe"C:\Users\Admin\AppData\Local\Temp\._cache_._cache_qbOdWSNNuqquo2E.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3988
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 12204⤵
- Program crash
PID:1652
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2720 -ip 27201⤵PID:3420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD540c32c129e09d3eb618e27eb168aaadf
SHA16a35a5fa5a53ceba217c66562477e954aec8eb2b
SHA256e09eaaa707261756f322c8d5b12af0a09c575ffbdd7bf19b895cab4982b7f68a
SHA51272ba764a542f0f61b0375a37e646d7bbdb78ca2b1aabedd33a42472e5a8099211311d699161ba51f03db6a46481556644542f991e7ef443eec2721d093b7da48
-
Filesize
2.0MB
MD540c32c129e09d3eb618e27eb168aaadf
SHA16a35a5fa5a53ceba217c66562477e954aec8eb2b
SHA256e09eaaa707261756f322c8d5b12af0a09c575ffbdd7bf19b895cab4982b7f68a
SHA51272ba764a542f0f61b0375a37e646d7bbdb78ca2b1aabedd33a42472e5a8099211311d699161ba51f03db6a46481556644542f991e7ef443eec2721d093b7da48
-
Filesize
2.0MB
MD540c32c129e09d3eb618e27eb168aaadf
SHA16a35a5fa5a53ceba217c66562477e954aec8eb2b
SHA256e09eaaa707261756f322c8d5b12af0a09c575ffbdd7bf19b895cab4982b7f68a
SHA51272ba764a542f0f61b0375a37e646d7bbdb78ca2b1aabedd33a42472e5a8099211311d699161ba51f03db6a46481556644542f991e7ef443eec2721d093b7da48
-
Filesize
127KB
MD52306789692c2e5e8ea14fe50fcb67f8a
SHA1c8b5ebd3841889ece6b1fb8ee62d6b3aaf752912
SHA2568fd9fe29be30f381199070f2c09d8213c0ac8be98836086052bb83fe53d7f6c3
SHA512367d04fe143f81a78f78e997d32b97f8787a42f34da1026e99e990465243eb51dacd569e7ca298b40f7ba3e9e315249e23fcde60930af072ba5de10a568ded1b
-
Filesize
127KB
MD52306789692c2e5e8ea14fe50fcb67f8a
SHA1c8b5ebd3841889ece6b1fb8ee62d6b3aaf752912
SHA2568fd9fe29be30f381199070f2c09d8213c0ac8be98836086052bb83fe53d7f6c3
SHA512367d04fe143f81a78f78e997d32b97f8787a42f34da1026e99e990465243eb51dacd569e7ca298b40f7ba3e9e315249e23fcde60930af072ba5de10a568ded1b
-
Filesize
127KB
MD52306789692c2e5e8ea14fe50fcb67f8a
SHA1c8b5ebd3841889ece6b1fb8ee62d6b3aaf752912
SHA2568fd9fe29be30f381199070f2c09d8213c0ac8be98836086052bb83fe53d7f6c3
SHA512367d04fe143f81a78f78e997d32b97f8787a42f34da1026e99e990465243eb51dacd569e7ca298b40f7ba3e9e315249e23fcde60930af072ba5de10a568ded1b
-
Filesize
1.3MB
MD58aeb2829342f8bb9acb171472da1d64e
SHA1b04d798d1375c242273fd6a1d8553b9312663668
SHA2569d0618a3a6027f47ebd85a126770e86f37e6e47b35f2175e7fde30acf1d73020
SHA5122b3dfadd3dfc8ae36708774eecd78a183f60392742f8108c0e607f22e85e7046cf809e127a6cee36be3d0c81bb8b1cd553a46b960c9f41621cb1d5b0293b3db1
-
Filesize
1.3MB
MD58aeb2829342f8bb9acb171472da1d64e
SHA1b04d798d1375c242273fd6a1d8553b9312663668
SHA2569d0618a3a6027f47ebd85a126770e86f37e6e47b35f2175e7fde30acf1d73020
SHA5122b3dfadd3dfc8ae36708774eecd78a183f60392742f8108c0e607f22e85e7046cf809e127a6cee36be3d0c81bb8b1cd553a46b960c9f41621cb1d5b0293b3db1
-
Filesize
1.3MB
MD58aeb2829342f8bb9acb171472da1d64e
SHA1b04d798d1375c242273fd6a1d8553b9312663668
SHA2569d0618a3a6027f47ebd85a126770e86f37e6e47b35f2175e7fde30acf1d73020
SHA5122b3dfadd3dfc8ae36708774eecd78a183f60392742f8108c0e607f22e85e7046cf809e127a6cee36be3d0c81bb8b1cd553a46b960c9f41621cb1d5b0293b3db1
-
Filesize
1.3MB
MD58aeb2829342f8bb9acb171472da1d64e
SHA1b04d798d1375c242273fd6a1d8553b9312663668
SHA2569d0618a3a6027f47ebd85a126770e86f37e6e47b35f2175e7fde30acf1d73020
SHA5122b3dfadd3dfc8ae36708774eecd78a183f60392742f8108c0e607f22e85e7046cf809e127a6cee36be3d0c81bb8b1cd553a46b960c9f41621cb1d5b0293b3db1
-
Filesize
1.3MB
MD58aeb2829342f8bb9acb171472da1d64e
SHA1b04d798d1375c242273fd6a1d8553b9312663668
SHA2569d0618a3a6027f47ebd85a126770e86f37e6e47b35f2175e7fde30acf1d73020
SHA5122b3dfadd3dfc8ae36708774eecd78a183f60392742f8108c0e607f22e85e7046cf809e127a6cee36be3d0c81bb8b1cd553a46b960c9f41621cb1d5b0293b3db1
-
Filesize
1.3MB
MD58aeb2829342f8bb9acb171472da1d64e
SHA1b04d798d1375c242273fd6a1d8553b9312663668
SHA2569d0618a3a6027f47ebd85a126770e86f37e6e47b35f2175e7fde30acf1d73020
SHA5122b3dfadd3dfc8ae36708774eecd78a183f60392742f8108c0e607f22e85e7046cf809e127a6cee36be3d0c81bb8b1cd553a46b960c9f41621cb1d5b0293b3db1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1KB
MD53146a61fe7904fcbeb366e9cfece6363
SHA19f49579a8adec46f3737391e99a2fc81b4a43ad7
SHA256ef1c1262b48eb73e592f082bb4d4ee737ccac0a7b993b2c309e823aa6245839c
SHA512fd4109af9b867f179b2106e66e8295957a3e64751faea73d72b078c6019af859412ed1d3cb8b3b5f418d0e51cf217b50a90ef21bbcda6135fb24e0447c5bd020