Analysis
-
max time kernel
117s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2023, 06:35
Static task
static1
Behavioral task
behavioral1
Sample
MV SANTA MARGHERITA.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
MV SANTA MARGHERITA.exe
Resource
win10v2004-20230220-en
General
-
Target
MV SANTA MARGHERITA.exe
-
Size
577KB
-
MD5
5e6dbf1afb9cc8f38c18f08c35eb941a
-
SHA1
14783496940ad7dab9a27487778b877a3972ac0d
-
SHA256
f79efc614f027353e325afc63ad28655b796e13a5862aa9dbe07978a2d9516a0
-
SHA512
e463d217186042fee0ba3138338de619014044970785e24e9e298f620ddea389abe5e5bc7677224af42e89e0f3d3fae415d279519a2c47c68c785e7ea128b02c
-
SSDEEP
6144:S+p3MKTQZqRoNwcPbvsHa0MW4/G9OtxrkbaTC+srOFkhWvQ78l9m2hk1hIZGCzp2:PUZ2AwfHqVrHC+sQHC31hIsWp5fWp
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
thenewsfortoday.com - Port:
25 - Username:
[email protected] - Password:
Z7Ui1!@s6!!NjFu
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/1472-147-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/1472-147-0x0000000000400000-0x0000000000426000-memory.dmp family_stormkitty -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation MV SANTA MARGHERITA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MV SANTA MARGHERITA.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MV SANTA MARGHERITA.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MV SANTA MARGHERITA.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4568 set thread context of 1472 4568 MV SANTA MARGHERITA.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1492 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4568 MV SANTA MARGHERITA.exe 4568 MV SANTA MARGHERITA.exe 756 powershell.exe 1472 MV SANTA MARGHERITA.exe 756 powershell.exe 1472 MV SANTA MARGHERITA.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4568 MV SANTA MARGHERITA.exe Token: SeDebugPrivilege 756 powershell.exe Token: SeDebugPrivilege 1472 MV SANTA MARGHERITA.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4568 wrote to memory of 756 4568 MV SANTA MARGHERITA.exe 90 PID 4568 wrote to memory of 756 4568 MV SANTA MARGHERITA.exe 90 PID 4568 wrote to memory of 756 4568 MV SANTA MARGHERITA.exe 90 PID 4568 wrote to memory of 1492 4568 MV SANTA MARGHERITA.exe 92 PID 4568 wrote to memory of 1492 4568 MV SANTA MARGHERITA.exe 92 PID 4568 wrote to memory of 1492 4568 MV SANTA MARGHERITA.exe 92 PID 4568 wrote to memory of 1472 4568 MV SANTA MARGHERITA.exe 94 PID 4568 wrote to memory of 1472 4568 MV SANTA MARGHERITA.exe 94 PID 4568 wrote to memory of 1472 4568 MV SANTA MARGHERITA.exe 94 PID 4568 wrote to memory of 1472 4568 MV SANTA MARGHERITA.exe 94 PID 4568 wrote to memory of 1472 4568 MV SANTA MARGHERITA.exe 94 PID 4568 wrote to memory of 1472 4568 MV SANTA MARGHERITA.exe 94 PID 4568 wrote to memory of 1472 4568 MV SANTA MARGHERITA.exe 94 PID 4568 wrote to memory of 1472 4568 MV SANTA MARGHERITA.exe 94 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MV SANTA MARGHERITA.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MV SANTA MARGHERITA.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MV SANTA MARGHERITA.exe"C:\Users\Admin\AppData\Local\Temp\MV SANTA MARGHERITA.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CzotesWrBYoEC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CzotesWrBYoEC" /XML "C:\Users\Admin\AppData\Local\Temp\tmp80F7.tmp"2⤵
- Creates scheduled task(s)
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\MV SANTA MARGHERITA.exe"C:\Users\Admin\AppData\Local\Temp\MV SANTA MARGHERITA.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1472
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD533d62ef2c354f839a8b2b987e6ee41e7
SHA1d76f64ac411a61f3f232f7f9f7b179bd34042226
SHA256f6a84062cb11ccf802324692c2c4c48543377cf717d98efd5de695ed6d0a97d9
SHA512d68a426b2f4646bb45e2267d60680166a8effb9a461e5a07756ba13a3bdf36b27e6e9777d945d03a62362e6976e92214c53ffc7c4f03ec28d3fcfc9a442c5e3c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5d7de0e045fd766211173c68053c1d87b
SHA154562ff1f0b463d52dc4891170defbc2ab625a9c
SHA256396ce1a42034ae4960673904cf7cf978d8ced57250ef74ffbd3dd2dc767cd63c
SHA51203339e73f175bdc57a7ac2108092dacbcd54ed66d3ff19c70556a4bdd76c240ee9efae850c9b4fddd4a1c212242b8f83a68f56ffa269e8fb63eecc5128848148