Analysis
-
max time kernel
123s -
max time network
214s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
zwqzBp3lyu3UPYc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
zwqzBp3lyu3UPYc.exe
Resource
win10v2004-20230221-en
General
-
Target
zwqzBp3lyu3UPYc.exe
-
Size
662KB
-
MD5
665e0b39d01ec408f1e8f7fc1b2bec32
-
SHA1
a42c424b54ac462f3158eff4b873bb0b0535d58f
-
SHA256
15696d741a180dacb5b3bb87cad566b4f2ffca1df0a6673d03f9b40c71ea4def
-
SHA512
bc225e25ab3f5c1621b3ce91372c811444e20777ada905079fb560c991fccee3a14f7887ac623c6bf89e0b88323588457a1aab1f1cd3662214bc686b05e7508e
-
SSDEEP
12288:e7ni4IykaC+tMsWsNjQ9s+7LyW3avZPox1SumL:e7cd+tEqcLLyLhS1Sum
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5850516910:AAGFrVyywXI7npTHbZn_GIq2nguuXg2t7Lc/sendMessage?chat_id=5716598986
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 7 IoCs
resource yara_rule behavioral1/memory/332-63-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/332-64-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/332-66-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/332-68-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/332-70-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/332-71-0x0000000000350000-0x0000000000390000-memory.dmp family_snakekeylogger behavioral1/memory/332-72-0x0000000000350000-0x0000000000390000-memory.dmp family_snakekeylogger -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zwqzBp3lyu3UPYc.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zwqzBp3lyu3UPYc.exe Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zwqzBp3lyu3UPYc.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 628 set thread context of 332 628 zwqzBp3lyu3UPYc.exe 29 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 628 zwqzBp3lyu3UPYc.exe 332 zwqzBp3lyu3UPYc.exe 332 zwqzBp3lyu3UPYc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 628 zwqzBp3lyu3UPYc.exe Token: SeDebugPrivilege 332 zwqzBp3lyu3UPYc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 628 wrote to memory of 676 628 zwqzBp3lyu3UPYc.exe 28 PID 628 wrote to memory of 676 628 zwqzBp3lyu3UPYc.exe 28 PID 628 wrote to memory of 676 628 zwqzBp3lyu3UPYc.exe 28 PID 628 wrote to memory of 676 628 zwqzBp3lyu3UPYc.exe 28 PID 628 wrote to memory of 332 628 zwqzBp3lyu3UPYc.exe 29 PID 628 wrote to memory of 332 628 zwqzBp3lyu3UPYc.exe 29 PID 628 wrote to memory of 332 628 zwqzBp3lyu3UPYc.exe 29 PID 628 wrote to memory of 332 628 zwqzBp3lyu3UPYc.exe 29 PID 628 wrote to memory of 332 628 zwqzBp3lyu3UPYc.exe 29 PID 628 wrote to memory of 332 628 zwqzBp3lyu3UPYc.exe 29 PID 628 wrote to memory of 332 628 zwqzBp3lyu3UPYc.exe 29 PID 628 wrote to memory of 332 628 zwqzBp3lyu3UPYc.exe 29 PID 628 wrote to memory of 332 628 zwqzBp3lyu3UPYc.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zwqzBp3lyu3UPYc.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zwqzBp3lyu3UPYc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\zwqzBp3lyu3UPYc.exe"C:\Users\Admin\AppData\Local\Temp\zwqzBp3lyu3UPYc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\zwqzBp3lyu3UPYc.exe"C:\Users\Admin\AppData\Local\Temp\zwqzBp3lyu3UPYc.exe"2⤵PID:676
-
-
C:\Users\Admin\AppData\Local\Temp\zwqzBp3lyu3UPYc.exe"C:\Users\Admin\AppData\Local\Temp\zwqzBp3lyu3UPYc.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:332
-