Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-06-2023 13:20
Static task
static1
Behavioral task
behavioral1
Sample
CaixaBank _ banca digital CaixaBankNow.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
CaixaBank _ banca digital CaixaBankNow.exe
Resource
win10v2004-20230220-en
General
-
Target
CaixaBank _ banca digital CaixaBankNow.exe
-
Size
767KB
-
MD5
4b6be38cb9bf11d6dfe312668ada7616
-
SHA1
fef22666290a4dea202b4cce1ad934af6f61fd56
-
SHA256
3c4b8818b3e073f0e5ac71ad850ae2ef3f1a5270d99169ee9892fe86977642af
-
SHA512
2682673865311c2eda1c862f45974c5f43ff22357d8ccf849f91a8339a0095b1c7a1acf19ada128ef62c399eaf5ef61cd7f5e8e82b56df5fecc115a65ecefa81
-
SSDEEP
12288:Lx+OSUAh3NVr572iNa7xdvo/MdyrhFgtDsuBHsSj5J4+saBGHfNP4yKylHaC1Z4h:0N1U9BqmycgiH75BMNP4yKDr3RXl/o1m
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.mutuadebasto.pt - Port:
587 - Username:
fernando.basto@mutuadebasto.pt - Password:
mutua_Fernando123 - Email To:
brownrocketss@gmail.com
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1512-63-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1512-64-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1512-66-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1512-68-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1512-70-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1512-71-0x0000000004360000-0x00000000043A0000-memory.dmp family_snakekeylogger behavioral1/memory/1512-72-0x0000000004360000-0x00000000043A0000-memory.dmp family_snakekeylogger -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
CaixaBank _ banca digital CaixaBankNow.exedescription pid process target process PID 1200 set thread context of 1512 1200 CaixaBank _ banca digital CaixaBankNow.exe CaixaBank _ banca digital CaixaBankNow.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
CaixaBank _ banca digital CaixaBankNow.exeCaixaBank _ banca digital CaixaBankNow.exepid process 1200 CaixaBank _ banca digital CaixaBankNow.exe 1200 CaixaBank _ banca digital CaixaBankNow.exe 1512 CaixaBank _ banca digital CaixaBankNow.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
CaixaBank _ banca digital CaixaBankNow.exeCaixaBank _ banca digital CaixaBankNow.exedescription pid process Token: SeDebugPrivilege 1200 CaixaBank _ banca digital CaixaBankNow.exe Token: SeDebugPrivilege 1512 CaixaBank _ banca digital CaixaBankNow.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
CaixaBank _ banca digital CaixaBankNow.exedescription pid process target process PID 1200 wrote to memory of 1512 1200 CaixaBank _ banca digital CaixaBankNow.exe CaixaBank _ banca digital CaixaBankNow.exe PID 1200 wrote to memory of 1512 1200 CaixaBank _ banca digital CaixaBankNow.exe CaixaBank _ banca digital CaixaBankNow.exe PID 1200 wrote to memory of 1512 1200 CaixaBank _ banca digital CaixaBankNow.exe CaixaBank _ banca digital CaixaBankNow.exe PID 1200 wrote to memory of 1512 1200 CaixaBank _ banca digital CaixaBankNow.exe CaixaBank _ banca digital CaixaBankNow.exe PID 1200 wrote to memory of 1512 1200 CaixaBank _ banca digital CaixaBankNow.exe CaixaBank _ banca digital CaixaBankNow.exe PID 1200 wrote to memory of 1512 1200 CaixaBank _ banca digital CaixaBankNow.exe CaixaBank _ banca digital CaixaBankNow.exe PID 1200 wrote to memory of 1512 1200 CaixaBank _ banca digital CaixaBankNow.exe CaixaBank _ banca digital CaixaBankNow.exe PID 1200 wrote to memory of 1512 1200 CaixaBank _ banca digital CaixaBankNow.exe CaixaBank _ banca digital CaixaBankNow.exe PID 1200 wrote to memory of 1512 1200 CaixaBank _ banca digital CaixaBankNow.exe CaixaBank _ banca digital CaixaBankNow.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CaixaBank _ banca digital CaixaBankNow.exe"C:\Users\Admin\AppData\Local\Temp\CaixaBank _ banca digital CaixaBankNow.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\CaixaBank _ banca digital CaixaBankNow.exe"C:\Users\Admin\AppData\Local\Temp\CaixaBank _ banca digital CaixaBankNow.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1200-54-0x0000000000E10000-0x0000000000ED6000-memory.dmpFilesize
792KB
-
memory/1200-55-0x00000000047D0000-0x0000000004810000-memory.dmpFilesize
256KB
-
memory/1200-56-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1200-57-0x00000000047D0000-0x0000000004810000-memory.dmpFilesize
256KB
-
memory/1200-58-0x0000000000410000-0x000000000041C000-memory.dmpFilesize
48KB
-
memory/1200-59-0x0000000004EB0000-0x0000000004F14000-memory.dmpFilesize
400KB
-
memory/1200-60-0x0000000004750000-0x000000000477A000-memory.dmpFilesize
168KB
-
memory/1512-61-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1512-62-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1512-63-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1512-64-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1512-66-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1512-65-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1512-68-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1512-70-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1512-71-0x0000000004360000-0x00000000043A0000-memory.dmpFilesize
256KB
-
memory/1512-72-0x0000000004360000-0x00000000043A0000-memory.dmpFilesize
256KB