Analysis
-
max time kernel
97s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19/04/2023, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
PO YUTTR565.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PO YUTTR565.exe
Resource
win10v2004-20230220-en
General
-
Target
PO YUTTR565.exe
-
Size
551KB
-
MD5
478d232a8926f8a9167818a69ca7790b
-
SHA1
2ca3c452a07885df7aa6031b6dd427a090a41d4b
-
SHA256
c45857bf418c526b5652d2efea575e9c396fd9f46402b48cae1315a59dc13837
-
SHA512
9230fe7c05f023e7b309de862344d96e1ff8865c995ceec36c54118bc2254575e9d3d6943cd15d779a4fd6eeffc95f3f7606f623b7d3670f118a3b474f0a6b93
-
SSDEEP
12288:y1pSqeDbprMALNIt2W1y54duxtzJnU2GZlNYLTfX:+S7ZKt2MuFU2KlNGbX
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6221660400:AAGb-WADrhdDFxd9kxzjtg3jdDw9-uvNVlM/sendMessage?chat_id=6200392710
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 7 IoCs
resource yara_rule behavioral1/memory/1220-62-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1220-63-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1220-65-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1220-67-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1220-69-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1220-70-0x0000000004AC0000-0x0000000004B00000-memory.dmp family_snakekeylogger behavioral1/memory/1220-71-0x0000000004AC0000-0x0000000004B00000-memory.dmp family_snakekeylogger -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 6 IoCs
resource yara_rule behavioral1/memory/1220-62-0x0000000000400000-0x0000000000426000-memory.dmp family_stormkitty behavioral1/memory/1220-63-0x0000000000400000-0x0000000000426000-memory.dmp family_stormkitty behavioral1/memory/1220-65-0x0000000000400000-0x0000000000426000-memory.dmp family_stormkitty behavioral1/memory/1220-67-0x0000000000400000-0x0000000000426000-memory.dmp family_stormkitty behavioral1/memory/1220-69-0x0000000000400000-0x0000000000426000-memory.dmp family_stormkitty behavioral1/memory/1220-70-0x0000000004AC0000-0x0000000004B00000-memory.dmp family_stormkitty -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO YUTTR565.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO YUTTR565.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO YUTTR565.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1732 set thread context of 1220 1732 PO YUTTR565.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1220 PO YUTTR565.exe 1220 PO YUTTR565.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1220 PO YUTTR565.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1220 1732 PO YUTTR565.exe 28 PID 1732 wrote to memory of 1220 1732 PO YUTTR565.exe 28 PID 1732 wrote to memory of 1220 1732 PO YUTTR565.exe 28 PID 1732 wrote to memory of 1220 1732 PO YUTTR565.exe 28 PID 1732 wrote to memory of 1220 1732 PO YUTTR565.exe 28 PID 1732 wrote to memory of 1220 1732 PO YUTTR565.exe 28 PID 1732 wrote to memory of 1220 1732 PO YUTTR565.exe 28 PID 1732 wrote to memory of 1220 1732 PO YUTTR565.exe 28 PID 1732 wrote to memory of 1220 1732 PO YUTTR565.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO YUTTR565.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PO YUTTR565.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO YUTTR565.exe"C:\Users\Admin\AppData\Local\Temp\PO YUTTR565.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\PO YUTTR565.exe"C:\Users\Admin\AppData\Local\Temp\PO YUTTR565.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1220
-