Analysis

  • max time kernel
    80s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    30/05/2023, 07:57

General

  • Target

    Factura N° 097.PDF.exe

  • Size

    650KB

  • MD5

    d4e72faf71141721fb6ee888819c1e61

  • SHA1

    77f9100389e2282342213301b3b48526726ea939

  • SHA256

    a7df5eb83434a5da24e394b94c775957e42ca3b36f3f76c582af50eeed525693

  • SHA512

    72850ebd65f06c80d4857bc49a2c7c3fd5738704b04d96ac65bb92b4cc3fb5503d4e4674827090e26af9cb9ca65c4dd5f563812f1d7148e37d274ff9c3baf052

  • SSDEEP

    12288:csIdud2iNfmFx2iqNhujGjUXD7VrYozutVaTQuQMSQ3A9QK2FIRKsr:csIdud1lmFxU6dYoKtYTW1H

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.mutuadebasto.pt
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    mutua_Fernando123

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 7 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Factura N° 097.PDF.exe
    "C:\Users\Admin\AppData\Local\Temp\Factura N° 097.PDF.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Users\Admin\AppData\Local\Temp\Factura N° 097.PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\Factura N° 097.PDF.exe"
      2⤵
        PID:1668
      • C:\Users\Admin\AppData\Local\Temp\Factura N° 097.PDF.exe
        "C:\Users\Admin\AppData\Local\Temp\Factura N° 097.PDF.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: RenamesItself
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1384

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            62KB

            MD5

            3ac860860707baaf32469fa7cc7c0192

            SHA1

            c33c2acdaba0e6fa41fd2f00f186804722477639

            SHA256

            d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

            SHA512

            d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            1b26866d0e9159986174e45446542cf2

            SHA1

            e19507c8ade5ab974ea6ea23ae9583e1495b16c9

            SHA256

            1552336d3c6ac0ea4071eb586e0dd62ca2cc9185df885b19aee257adae55c75f

            SHA512

            7c124dc3276c21d3b28bb45315d9a62092017e8b1b74d058ac5fac2443debaf2364393739a311b4fdd1caf609824b1cec6ffd2fdfe974ba0d6d3d62446f0200f

          • C:\Users\Admin\AppData\Local\Temp\CabF431.tmp

            Filesize

            61KB

            MD5

            fc4666cbca561e864e7fdf883a9e6661

            SHA1

            2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

            SHA256

            10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

            SHA512

            c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

          • C:\Users\Admin\AppData\Local\Temp\TarF58F.tmp

            Filesize

            164KB

            MD5

            4ff65ad929cd9a367680e0e5b1c08166

            SHA1

            c0af0d4396bd1f15c45f39d3b849ba444233b3a2

            SHA256

            c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

            SHA512

            f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

          • memory/1384-71-0x0000000004A90000-0x0000000004AD0000-memory.dmp

            Filesize

            256KB

          • memory/1384-70-0x0000000000400000-0x0000000000426000-memory.dmp

            Filesize

            152KB

          • memory/1384-138-0x0000000004A90000-0x0000000004AD0000-memory.dmp

            Filesize

            256KB

          • memory/1384-61-0x0000000000400000-0x0000000000426000-memory.dmp

            Filesize

            152KB

          • memory/1384-62-0x0000000000400000-0x0000000000426000-memory.dmp

            Filesize

            152KB

          • memory/1384-63-0x0000000000400000-0x0000000000426000-memory.dmp

            Filesize

            152KB

          • memory/1384-64-0x0000000000400000-0x0000000000426000-memory.dmp

            Filesize

            152KB

          • memory/1384-65-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/1384-66-0x0000000000400000-0x0000000000426000-memory.dmp

            Filesize

            152KB

          • memory/1384-68-0x0000000000400000-0x0000000000426000-memory.dmp

            Filesize

            152KB

          • memory/1520-59-0x0000000004ED0000-0x0000000004F32000-memory.dmp

            Filesize

            392KB

          • memory/1520-54-0x0000000000BE0000-0x0000000000C88000-memory.dmp

            Filesize

            672KB

          • memory/1520-58-0x0000000000520000-0x000000000052A000-memory.dmp

            Filesize

            40KB

          • memory/1520-57-0x0000000004D30000-0x0000000004D70000-memory.dmp

            Filesize

            256KB

          • memory/1520-56-0x0000000004D30000-0x0000000004D70000-memory.dmp

            Filesize

            256KB

          • memory/1520-55-0x0000000000410000-0x000000000041E000-memory.dmp

            Filesize

            56KB

          • memory/1520-60-0x0000000000AC0000-0x0000000000AEA000-memory.dmp

            Filesize

            168KB