Analysis
-
max time kernel
1793s -
max time network
1571s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2023, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
qbOdWSNNuqquo2E.exe
Resource
win10v2004-20230220-en
General
-
Target
qbOdWSNNuqquo2E.exe
-
Size
2.0MB
-
MD5
40c32c129e09d3eb618e27eb168aaadf
-
SHA1
6a35a5fa5a53ceba217c66562477e954aec8eb2b
-
SHA256
e09eaaa707261756f322c8d5b12af0a09c575ffbdd7bf19b895cab4982b7f68a
-
SHA512
72ba764a542f0f61b0375a37e646d7bbdb78ca2b1aabedd33a42472e5a8099211311d699161ba51f03db6a46481556644542f991e7ef443eec2721d093b7da48
-
SSDEEP
49152:6nsHyjtk2MYC5GDDMZEf4F0fVGJ2LxsL9ve049:6nsmtk2a1igSA2F0DU
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6241220793:AAFx6XFOw5z4Op7twC8hAqYib_mTz67Z4Ak/sendMessage?chat_id=2054148913
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 9 IoCs
resource yara_rule behavioral1/memory/2028-370-0x0000000000400000-0x00000000004E2000-memory.dmp family_snakekeylogger behavioral1/memory/2028-377-0x0000000000400000-0x00000000004E2000-memory.dmp family_snakekeylogger behavioral1/memory/2028-373-0x0000000000400000-0x00000000004E2000-memory.dmp family_snakekeylogger behavioral1/files/0x00010000000230f9-395.dat family_snakekeylogger behavioral1/memory/2028-441-0x0000000000400000-0x00000000004E2000-memory.dmp family_snakekeylogger behavioral1/files/0x00010000000230f9-452.dat family_snakekeylogger behavioral1/memory/2028-453-0x0000000000400000-0x00000000004E2000-memory.dmp family_snakekeylogger behavioral1/files/0x00010000000230f9-451.dat family_snakekeylogger behavioral1/memory/4424-454-0x0000000000AB0000-0x0000000000AD6000-memory.dmp family_snakekeylogger -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation qbOdWSNNuqquo2E.exe -
Executes dropped EXE 6 IoCs
pid Process 4020 ._cache_qbOdWSNNuqquo2E.exe 3672 Synaptics.exe 60 ._cache_Synaptics.exe 3912 ._cache_Synaptics.exe 2028 ._cache_Synaptics.exe 4424 ._cache_._cache_Synaptics.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" qbOdWSNNuqquo2E.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 52 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 60 set thread context of 2028 60 ._cache_Synaptics.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2740 4020 WerFault.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 448 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ qbOdWSNNuqquo2E.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ._cache_Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2352 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 60 ._cache_Synaptics.exe 60 ._cache_Synaptics.exe 3868 powershell.exe 3868 powershell.exe 4424 ._cache_._cache_Synaptics.exe 4424 ._cache_._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3868 powershell.exe Token: SeDebugPrivilege 60 ._cache_Synaptics.exe Token: SeDebugPrivilege 4424 ._cache_._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2352 EXCEL.EXE 2352 EXCEL.EXE 2352 EXCEL.EXE 2352 EXCEL.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4232 wrote to memory of 4020 4232 qbOdWSNNuqquo2E.exe 82 PID 4232 wrote to memory of 4020 4232 qbOdWSNNuqquo2E.exe 82 PID 4232 wrote to memory of 4020 4232 qbOdWSNNuqquo2E.exe 82 PID 4232 wrote to memory of 3672 4232 qbOdWSNNuqquo2E.exe 83 PID 4232 wrote to memory of 3672 4232 qbOdWSNNuqquo2E.exe 83 PID 4232 wrote to memory of 3672 4232 qbOdWSNNuqquo2E.exe 83 PID 3672 wrote to memory of 60 3672 Synaptics.exe 84 PID 3672 wrote to memory of 60 3672 Synaptics.exe 84 PID 3672 wrote to memory of 60 3672 Synaptics.exe 84 PID 60 wrote to memory of 3868 60 ._cache_Synaptics.exe 95 PID 60 wrote to memory of 3868 60 ._cache_Synaptics.exe 95 PID 60 wrote to memory of 3868 60 ._cache_Synaptics.exe 95 PID 60 wrote to memory of 448 60 ._cache_Synaptics.exe 97 PID 60 wrote to memory of 448 60 ._cache_Synaptics.exe 97 PID 60 wrote to memory of 448 60 ._cache_Synaptics.exe 97 PID 60 wrote to memory of 3912 60 ._cache_Synaptics.exe 100 PID 60 wrote to memory of 3912 60 ._cache_Synaptics.exe 100 PID 60 wrote to memory of 3912 60 ._cache_Synaptics.exe 100 PID 60 wrote to memory of 2028 60 ._cache_Synaptics.exe 101 PID 60 wrote to memory of 2028 60 ._cache_Synaptics.exe 101 PID 60 wrote to memory of 2028 60 ._cache_Synaptics.exe 101 PID 60 wrote to memory of 2028 60 ._cache_Synaptics.exe 101 PID 60 wrote to memory of 2028 60 ._cache_Synaptics.exe 101 PID 60 wrote to memory of 2028 60 ._cache_Synaptics.exe 101 PID 60 wrote to memory of 2028 60 ._cache_Synaptics.exe 101 PID 60 wrote to memory of 2028 60 ._cache_Synaptics.exe 101 PID 60 wrote to memory of 2028 60 ._cache_Synaptics.exe 101 PID 60 wrote to memory of 2028 60 ._cache_Synaptics.exe 101 PID 60 wrote to memory of 2028 60 ._cache_Synaptics.exe 101 PID 2028 wrote to memory of 4424 2028 ._cache_Synaptics.exe 102 PID 2028 wrote to memory of 4424 2028 ._cache_Synaptics.exe 102 PID 2028 wrote to memory of 4424 2028 ._cache_Synaptics.exe 102 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_Synaptics.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\qbOdWSNNuqquo2E.exe"C:\Users\Admin\AppData\Local\Temp\qbOdWSNNuqquo2E.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\._cache_qbOdWSNNuqquo2E.exe"C:\Users\Admin\AppData\Local\Temp\._cache_qbOdWSNNuqquo2E.exe"2⤵
- Executes dropped EXE
PID:4020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 12203⤵
- Program crash
PID:2740
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\bRBgyCtm.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bRBgyCtm" /XML "C:\Users\Admin\AppData\Local\Temp\tmp93F3.tmp"4⤵
- Creates scheduled task(s)
PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"4⤵
- Executes dropped EXE
PID:3912
-
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\._cache_._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_._cache_Synaptics.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4424
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4020 -ip 40201⤵PID:4036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD540c32c129e09d3eb618e27eb168aaadf
SHA16a35a5fa5a53ceba217c66562477e954aec8eb2b
SHA256e09eaaa707261756f322c8d5b12af0a09c575ffbdd7bf19b895cab4982b7f68a
SHA51272ba764a542f0f61b0375a37e646d7bbdb78ca2b1aabedd33a42472e5a8099211311d699161ba51f03db6a46481556644542f991e7ef443eec2721d093b7da48
-
Filesize
2.0MB
MD540c32c129e09d3eb618e27eb168aaadf
SHA16a35a5fa5a53ceba217c66562477e954aec8eb2b
SHA256e09eaaa707261756f322c8d5b12af0a09c575ffbdd7bf19b895cab4982b7f68a
SHA51272ba764a542f0f61b0375a37e646d7bbdb78ca2b1aabedd33a42472e5a8099211311d699161ba51f03db6a46481556644542f991e7ef443eec2721d093b7da48
-
Filesize
2.0MB
MD540c32c129e09d3eb618e27eb168aaadf
SHA16a35a5fa5a53ceba217c66562477e954aec8eb2b
SHA256e09eaaa707261756f322c8d5b12af0a09c575ffbdd7bf19b895cab4982b7f68a
SHA51272ba764a542f0f61b0375a37e646d7bbdb78ca2b1aabedd33a42472e5a8099211311d699161ba51f03db6a46481556644542f991e7ef443eec2721d093b7da48
-
Filesize
127KB
MD52306789692c2e5e8ea14fe50fcb67f8a
SHA1c8b5ebd3841889ece6b1fb8ee62d6b3aaf752912
SHA2568fd9fe29be30f381199070f2c09d8213c0ac8be98836086052bb83fe53d7f6c3
SHA512367d04fe143f81a78f78e997d32b97f8787a42f34da1026e99e990465243eb51dacd569e7ca298b40f7ba3e9e315249e23fcde60930af072ba5de10a568ded1b
-
Filesize
127KB
MD52306789692c2e5e8ea14fe50fcb67f8a
SHA1c8b5ebd3841889ece6b1fb8ee62d6b3aaf752912
SHA2568fd9fe29be30f381199070f2c09d8213c0ac8be98836086052bb83fe53d7f6c3
SHA512367d04fe143f81a78f78e997d32b97f8787a42f34da1026e99e990465243eb51dacd569e7ca298b40f7ba3e9e315249e23fcde60930af072ba5de10a568ded1b
-
Filesize
127KB
MD52306789692c2e5e8ea14fe50fcb67f8a
SHA1c8b5ebd3841889ece6b1fb8ee62d6b3aaf752912
SHA2568fd9fe29be30f381199070f2c09d8213c0ac8be98836086052bb83fe53d7f6c3
SHA512367d04fe143f81a78f78e997d32b97f8787a42f34da1026e99e990465243eb51dacd569e7ca298b40f7ba3e9e315249e23fcde60930af072ba5de10a568ded1b
-
Filesize
1.3MB
MD58aeb2829342f8bb9acb171472da1d64e
SHA1b04d798d1375c242273fd6a1d8553b9312663668
SHA2569d0618a3a6027f47ebd85a126770e86f37e6e47b35f2175e7fde30acf1d73020
SHA5122b3dfadd3dfc8ae36708774eecd78a183f60392742f8108c0e607f22e85e7046cf809e127a6cee36be3d0c81bb8b1cd553a46b960c9f41621cb1d5b0293b3db1
-
Filesize
1.3MB
MD58aeb2829342f8bb9acb171472da1d64e
SHA1b04d798d1375c242273fd6a1d8553b9312663668
SHA2569d0618a3a6027f47ebd85a126770e86f37e6e47b35f2175e7fde30acf1d73020
SHA5122b3dfadd3dfc8ae36708774eecd78a183f60392742f8108c0e607f22e85e7046cf809e127a6cee36be3d0c81bb8b1cd553a46b960c9f41621cb1d5b0293b3db1
-
Filesize
1.3MB
MD58aeb2829342f8bb9acb171472da1d64e
SHA1b04d798d1375c242273fd6a1d8553b9312663668
SHA2569d0618a3a6027f47ebd85a126770e86f37e6e47b35f2175e7fde30acf1d73020
SHA5122b3dfadd3dfc8ae36708774eecd78a183f60392742f8108c0e607f22e85e7046cf809e127a6cee36be3d0c81bb8b1cd553a46b960c9f41621cb1d5b0293b3db1
-
Filesize
1.3MB
MD58aeb2829342f8bb9acb171472da1d64e
SHA1b04d798d1375c242273fd6a1d8553b9312663668
SHA2569d0618a3a6027f47ebd85a126770e86f37e6e47b35f2175e7fde30acf1d73020
SHA5122b3dfadd3dfc8ae36708774eecd78a183f60392742f8108c0e607f22e85e7046cf809e127a6cee36be3d0c81bb8b1cd553a46b960c9f41621cb1d5b0293b3db1
-
Filesize
1.3MB
MD58aeb2829342f8bb9acb171472da1d64e
SHA1b04d798d1375c242273fd6a1d8553b9312663668
SHA2569d0618a3a6027f47ebd85a126770e86f37e6e47b35f2175e7fde30acf1d73020
SHA5122b3dfadd3dfc8ae36708774eecd78a183f60392742f8108c0e607f22e85e7046cf809e127a6cee36be3d0c81bb8b1cd553a46b960c9f41621cb1d5b0293b3db1
-
Filesize
1.3MB
MD58aeb2829342f8bb9acb171472da1d64e
SHA1b04d798d1375c242273fd6a1d8553b9312663668
SHA2569d0618a3a6027f47ebd85a126770e86f37e6e47b35f2175e7fde30acf1d73020
SHA5122b3dfadd3dfc8ae36708774eecd78a183f60392742f8108c0e607f22e85e7046cf809e127a6cee36be3d0c81bb8b1cd553a46b960c9f41621cb1d5b0293b3db1
-
Filesize
1.3MB
MD58aeb2829342f8bb9acb171472da1d64e
SHA1b04d798d1375c242273fd6a1d8553b9312663668
SHA2569d0618a3a6027f47ebd85a126770e86f37e6e47b35f2175e7fde30acf1d73020
SHA5122b3dfadd3dfc8ae36708774eecd78a183f60392742f8108c0e607f22e85e7046cf809e127a6cee36be3d0c81bb8b1cd553a46b960c9f41621cb1d5b0293b3db1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD59f5633b4773c462255b096e62fe8f78f
SHA12ab7a052d316ca6f6e2780255cd1da040064b22f
SHA256373e484271446b805a12be23431fe441df0355a3c1046274ba9acb1e6b0adac2
SHA512fd8b24cae6c602cab96a85fff3b93c46cb28c937c77722f5203dabcbfb9bc8e8e2be0b860dac5803cad5694d8c85dbf26360025bd44e9dc2ba4762e423bb7235
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04