Analysis
-
max time kernel
74s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
BA form.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
BA form.exe
Resource
win10v2004-20230220-en
General
-
Target
BA form.exe
-
Size
637KB
-
MD5
2d64651ad344d20a3726a5d308c4e2b8
-
SHA1
ac7c9dac64121c0e2586425d7769a6ae8179da75
-
SHA256
0b8f8615ac9193f5409cc48943cdc3e66fd58027058e594b4433ba110b94e197
-
SHA512
151ccc1e98d879517e647544476428ff34b4a60732b09bc6f2acd20878a91783913cd31a894116db4855fe10c5f2fc0c065a02f41bf9def6aea72129a362b82f
-
SSDEEP
12288:o8gBO5ZZC/W2n9Jgxf+084TTCOTkwjdJHB2QBkbYsTmysIEIsO2nY:rgqTC/fDgxFJTCOTJ5JHTkcZfIsO
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6160036640:AAHqrAdmG4_GQkcLvxoups3k8WSEUC34w1g/sendMessage?chat_id=2052461776
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 3 IoCs
resource yara_rule behavioral2/memory/960-140-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral2/memory/960-142-0x0000000005870000-0x0000000005880000-memory.dmp family_snakekeylogger behavioral2/memory/960-143-0x0000000005870000-0x0000000005880000-memory.dmp family_snakekeylogger -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/960-140-0x0000000000400000-0x0000000000426000-memory.dmp family_stormkitty -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 45 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4596 set thread context of 960 4596 BA form.exe 92 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 960 RegSvcs.exe 960 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 960 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4596 wrote to memory of 960 4596 BA form.exe 92 PID 4596 wrote to memory of 960 4596 BA form.exe 92 PID 4596 wrote to memory of 960 4596 BA form.exe 92 PID 4596 wrote to memory of 960 4596 BA form.exe 92 PID 4596 wrote to memory of 960 4596 BA form.exe 92 PID 4596 wrote to memory of 960 4596 BA form.exe 92 PID 4596 wrote to memory of 960 4596 BA form.exe 92 PID 4596 wrote to memory of 960 4596 BA form.exe 92 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BA form.exe"C:\Users\Admin\AppData\Local\Temp\BA form.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:960
-