Analysis
-
max time kernel
35s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10/05/2023, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
Ekstre.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Ekstre.exe
Resource
win10v2004-20230220-en
General
-
Target
Ekstre.exe
-
Size
1.3MB
-
MD5
076d5430af1ffea960bd52cfc641e99b
-
SHA1
aba1bf8a90fabe96565ecec2022d24e34626a921
-
SHA256
ee0fac5b1ab0a1e4c8efadea7919f8f1105d0928ca3a7c359a65af0246e06cf1
-
SHA512
50966bf59360c3a6a52716e3bb63a5d91bad4bd208241431ed15107ba94f40b4a6790042e0839ec8d63a3c521242032ad374b7511b5aa194eff5b063226d38bd
-
SSDEEP
24576:lTbBv5rUFcD6vbKBdqT4oDKvMrBW4eNTygt90e+hoyaxlI:PBH6vbKBUT4/vMr8jygt+0I
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5932548741:AAFytn5z9IUn93hcbUn3eb19fE08x1AWGz0/sendMessage?chat_id=5034680713
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 6 IoCs
resource yara_rule behavioral1/memory/1632-125-0x0000000000390000-0x0000000000AC4000-memory.dmp family_snakekeylogger behavioral1/memory/1632-127-0x0000000000390000-0x0000000000AC4000-memory.dmp family_snakekeylogger behavioral1/memory/1632-129-0x0000000000390000-0x0000000000AC4000-memory.dmp family_snakekeylogger behavioral1/memory/1632-130-0x0000000000390000-0x00000000003B6000-memory.dmp family_snakekeylogger behavioral1/memory/1632-131-0x0000000004BE0000-0x0000000004C20000-memory.dmp family_snakekeylogger behavioral1/memory/1632-132-0x0000000004BE0000-0x0000000004C20000-memory.dmp family_snakekeylogger -
Executes dropped EXE 1 IoCs
pid Process 1524 ukuvts.pif -
Loads dropped DLL 1 IoCs
pid Process 1628 wscript.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ukuvts.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "c:\\uipd\\ukuvts.pif c:\\uipd\\MTDG~1.DOC" ukuvts.pif -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1524 set thread context of 1632 1524 ukuvts.pif 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1632 RegSvcs.exe 1632 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1632 RegSvcs.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1136 wrote to memory of 1628 1136 Ekstre.exe 28 PID 1136 wrote to memory of 1628 1136 Ekstre.exe 28 PID 1136 wrote to memory of 1628 1136 Ekstre.exe 28 PID 1136 wrote to memory of 1628 1136 Ekstre.exe 28 PID 1628 wrote to memory of 1524 1628 wscript.exe 29 PID 1628 wrote to memory of 1524 1628 wscript.exe 29 PID 1628 wrote to memory of 1524 1628 wscript.exe 29 PID 1628 wrote to memory of 1524 1628 wscript.exe 29 PID 1628 wrote to memory of 1524 1628 wscript.exe 29 PID 1628 wrote to memory of 1524 1628 wscript.exe 29 PID 1628 wrote to memory of 1524 1628 wscript.exe 29 PID 1524 wrote to memory of 1632 1524 ukuvts.pif 30 PID 1524 wrote to memory of 1632 1524 ukuvts.pif 30 PID 1524 wrote to memory of 1632 1524 ukuvts.pif 30 PID 1524 wrote to memory of 1632 1524 ukuvts.pif 30 PID 1524 wrote to memory of 1632 1524 ukuvts.pif 30 PID 1524 wrote to memory of 1632 1524 ukuvts.pif 30 PID 1524 wrote to memory of 1632 1524 ukuvts.pif 30 PID 1524 wrote to memory of 1632 1524 ukuvts.pif 30 PID 1524 wrote to memory of 1632 1524 ukuvts.pif 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ekstre.exe"C:\Users\Admin\AppData\Local\Temp\Ekstre.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" Update-vq.h.vbe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\uipd\ukuvts.pif"C:\uipd\ukuvts.pif" mtdg.docx3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1632
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5f2188baab2aee3bba03d2bbb54cd26a6
SHA16464287935716184e60a2e12f3cbd86b349500e3
SHA25620db80e434a6f9d78ef8a3ec2014342d8c236f1d79c06cc09d847010bda6a17e
SHA512206e8384ee4f69cd3d8b8f267b4238da33287866572eba2191bdf552830206eeebc39ad269f34823c44bf238a32f01883d19f42af6096208098a869fbd361053
-
Filesize
101.1MB
MD56bb33ebf17de8bcff95d725450653cbf
SHA11a963327740ad4671f8f7e44588d44bb1d6e17e9
SHA256f1cc13f23c5098d60fae62958227f598d5d060ac8fa27b2decf2745c852f4a21
SHA51274a3d846a39af4ea8fc450c5597867ad45a19716d0877d1b1ddcba34ce68ef58e124debd409e633272b1d171bb2671e97da00a005068f99995e206ee9a97405d
-
Filesize
40KB
MD538633e2c314da564960d6b049003a664
SHA1ad77a1f49cee834d026a21a30e99fc07ebc4fde3
SHA256d92d2740e1559b9b708077fb888fc7f516e0ea0252b8a5b928ec431d96f89a68
SHA51294f3bcf97e7bb50495aee2d491e1b21f6453e3bc5520bf2bdba9ff4d9246c21990c867937fc897a4ae84fb636259c7032d177ee01914e1c249f46c4354e6ae00
-
Filesize
217KB
MD5090746eddc51c3e519a07916b62a2b4b
SHA166bd63fca76dc200d522dbefd19cad2c403cede4
SHA256252293c2696cd64b9ea054971192c62097d12e1a639ad6d988267e0648c706a0
SHA512065ae7912a13f7a312c33783e5f1e3a78084fdaa49460e78a280d8925389f2fdf65dcac84072c545f033d5a98ab0ffa7ff15c88c5b203f72f668a137a288d73f
-
Filesize
1.6MB
MD5a533f7dd1fee72bcc5dfd2d17f91bd00
SHA1a735119723b8f1ffe39942dc0537d2b9714e0ca6
SHA2568d7ff6354a950ed066d2513fbf059918b399bfb8232be5be90768746cb2a3684
SHA5124d7ad0cba961d11eb3604bd116b8fb08e3de5500cbeccb08aa60e9cc4720371fa50dd20ac2ebe6d05635f31f2b58d855b2afa05c1786461ea23c9cb9985ffd3f
-
Filesize
1.6MB
MD5a533f7dd1fee72bcc5dfd2d17f91bd00
SHA1a735119723b8f1ffe39942dc0537d2b9714e0ca6
SHA2568d7ff6354a950ed066d2513fbf059918b399bfb8232be5be90768746cb2a3684
SHA5124d7ad0cba961d11eb3604bd116b8fb08e3de5500cbeccb08aa60e9cc4720371fa50dd20ac2ebe6d05635f31f2b58d855b2afa05c1786461ea23c9cb9985ffd3f
-
Filesize
1.6MB
MD5a533f7dd1fee72bcc5dfd2d17f91bd00
SHA1a735119723b8f1ffe39942dc0537d2b9714e0ca6
SHA2568d7ff6354a950ed066d2513fbf059918b399bfb8232be5be90768746cb2a3684
SHA5124d7ad0cba961d11eb3604bd116b8fb08e3de5500cbeccb08aa60e9cc4720371fa50dd20ac2ebe6d05635f31f2b58d855b2afa05c1786461ea23c9cb9985ffd3f