Analysis
-
max time kernel
86s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15/05/2023, 12:57
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents.pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Shipping Documents.pdf.exe
Resource
win10v2004-20230220-en
General
-
Target
Shipping Documents.pdf.exe
-
Size
704KB
-
MD5
903734f7c57dc9f7de2e10c8efdddb44
-
SHA1
c4942900cb85153d90371e52398d42e4e715b756
-
SHA256
82a5ab20cca30fb6373b256808762ba3fe16ea61c36ccaa60d676c171f6741f6
-
SHA512
21cced8ccdbb367cd4e4c54364dbe7e7f9d1c5010b29772a7cd2df8cc81d5ffd448bb93bb5715fbc70b8c276a6340d36e543b306d59b52f082ca6faa08ab41bc
-
SSDEEP
12288:t4ZfTp7kxmYcuENSNi3UT8kI5FRTcMAHNOzE+v07NCRB4:tmLNGAXNSiUT8ffnr07
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6029559841:AAEqr8_NCfqapJgAzw8PoPbqoCosnsk1VO0/sendMessage?chat_id=6033043077
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 5 IoCs
resource yara_rule behavioral1/memory/984-77-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/984-78-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/984-80-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/984-82-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/984-84-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 5 IoCs
resource yara_rule behavioral1/memory/984-77-0x0000000000400000-0x0000000000426000-memory.dmp family_stormkitty behavioral1/memory/984-78-0x0000000000400000-0x0000000000426000-memory.dmp family_stormkitty behavioral1/memory/984-80-0x0000000000400000-0x0000000000426000-memory.dmp family_stormkitty behavioral1/memory/984-82-0x0000000000400000-0x0000000000426000-memory.dmp family_stormkitty behavioral1/memory/984-84-0x0000000000400000-0x0000000000426000-memory.dmp family_stormkitty -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Shipping Documents.pdf.exe Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Shipping Documents.pdf.exe Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Shipping Documents.pdf.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1340 set thread context of 984 1340 Shipping Documents.pdf.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1412 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 984 Shipping Documents.pdf.exe 756 powershell.exe 1496 powershell.exe 984 Shipping Documents.pdf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 984 Shipping Documents.pdf.exe Token: SeDebugPrivilege 756 powershell.exe Token: SeDebugPrivilege 1496 powershell.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1340 wrote to memory of 756 1340 Shipping Documents.pdf.exe 28 PID 1340 wrote to memory of 756 1340 Shipping Documents.pdf.exe 28 PID 1340 wrote to memory of 756 1340 Shipping Documents.pdf.exe 28 PID 1340 wrote to memory of 756 1340 Shipping Documents.pdf.exe 28 PID 1340 wrote to memory of 1496 1340 Shipping Documents.pdf.exe 30 PID 1340 wrote to memory of 1496 1340 Shipping Documents.pdf.exe 30 PID 1340 wrote to memory of 1496 1340 Shipping Documents.pdf.exe 30 PID 1340 wrote to memory of 1496 1340 Shipping Documents.pdf.exe 30 PID 1340 wrote to memory of 1412 1340 Shipping Documents.pdf.exe 32 PID 1340 wrote to memory of 1412 1340 Shipping Documents.pdf.exe 32 PID 1340 wrote to memory of 1412 1340 Shipping Documents.pdf.exe 32 PID 1340 wrote to memory of 1412 1340 Shipping Documents.pdf.exe 32 PID 1340 wrote to memory of 984 1340 Shipping Documents.pdf.exe 34 PID 1340 wrote to memory of 984 1340 Shipping Documents.pdf.exe 34 PID 1340 wrote to memory of 984 1340 Shipping Documents.pdf.exe 34 PID 1340 wrote to memory of 984 1340 Shipping Documents.pdf.exe 34 PID 1340 wrote to memory of 984 1340 Shipping Documents.pdf.exe 34 PID 1340 wrote to memory of 984 1340 Shipping Documents.pdf.exe 34 PID 1340 wrote to memory of 984 1340 Shipping Documents.pdf.exe 34 PID 1340 wrote to memory of 984 1340 Shipping Documents.pdf.exe 34 PID 1340 wrote to memory of 984 1340 Shipping Documents.pdf.exe 34 PID 984 wrote to memory of 1696 984 Shipping Documents.pdf.exe 35 PID 984 wrote to memory of 1696 984 Shipping Documents.pdf.exe 35 PID 984 wrote to memory of 1696 984 Shipping Documents.pdf.exe 35 PID 984 wrote to memory of 1696 984 Shipping Documents.pdf.exe 35 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Shipping Documents.pdf.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Shipping Documents.pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping Documents.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Shipping Documents.pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\QGqSfBwIEFtO.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QGqSfBwIEFtO" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCAA0.tmp"2⤵
- Creates scheduled task(s)
PID:1412
-
-
C:\Users\Admin\AppData\Local\Temp\Shipping Documents.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents.pdf.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:984 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵PID:1696
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5582cd37b554f79ab734499f7211c5442
SHA17e384edac53a0e8d716220670c482c57c7245f97
SHA2569a9bc74986e8703aafab96e7693fcb6c427b772ec6b35d0f4eed5243f1b92fe9
SHA51237df8fc8fe649762552474631ca4298084b6387350d6547db573f73293a6fb122648083096a7d0ae648f0a3b048e0c5a936e9c50e15af60ba09114ec3e43c822
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AB9L7VOET3K607Y8BHZC.temp
Filesize7KB
MD52caaaa24d8da0685e93afc844b366be5
SHA1a5a5565fd9d6143bd21d7b490803e22300eb60bc
SHA256c4f170777490f7a66944b3b56b4d2540e130562243242a2c22ec1cd3f3e7a1bb
SHA512d098acd821754ebd16a9709da67c46b0f548d93cc1580329fa9282d4b0b9576290c3d0a35933de27b21eafe3883e9160bff4b52b15951deecf25f628a22a691f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD52caaaa24d8da0685e93afc844b366be5
SHA1a5a5565fd9d6143bd21d7b490803e22300eb60bc
SHA256c4f170777490f7a66944b3b56b4d2540e130562243242a2c22ec1cd3f3e7a1bb
SHA512d098acd821754ebd16a9709da67c46b0f548d93cc1580329fa9282d4b0b9576290c3d0a35933de27b21eafe3883e9160bff4b52b15951deecf25f628a22a691f