Analysis

  • max time kernel
    49s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2023 14:10

General

  • Target

    file.exe

  • Size

    390KB

  • MD5

    66244fb1118f70553439a5afc47529ac

  • SHA1

    68250dcc265970b31d6fed79c008fe0972eec12c

  • SHA256

    8973a01c5fb01195763577375cc5e3b223c5ed680cbd646a0924cbcb37150ebb

  • SHA512

    8cd236ee3ab5ce209264cdbb3d00acc4399489474e47ef6e231d76fdd704a07b4060ca20e46f5e2ea618963dd4cb38fe38c4e91b42e79b7c2bdc68756d3719cb

  • SSDEEP

    6144:cTzoeC71TFqddJYDqR2B19LuduY0XoJt6FW9mVou0art+obeVxJAK/ngEdfbL2:KzDqRkGDqMnXhYJt6zSu0kMOWD3/ge/2

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6029559841:AAEqr8_NCfqapJgAzw8PoPbqoCosnsk1VO0/sendMessage?chat_id=6033043077

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 3 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\system32\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'
        3⤵
        • Creates scheduled task(s)
        PID:572
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp147B.tmp.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:828
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • UAC bypass
        • Looks for VirtualBox Guest Additions in registry
        • Looks for VMWare Tools registry key
        • Sets service image path in registry
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Maps connected drives based on registry
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1648
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svchost.exe" -Force
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1228
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
          4⤵
            PID:1712
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"
            4⤵
              PID:276
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
              4⤵
                PID:800
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"
                4⤵
                • Accesses Microsoft Outlook profiles
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                • outlook_office_path
                • outlook_win_path
                PID:1492
                • C:\Windows\SysWOW64\netsh.exe
                  "netsh" wlan show profile
                  5⤵
                    PID:1692

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Execution

          Scheduled Task

          1
          T1053

          Persistence

          Registry Run Keys / Startup Folder

          2
          T1060

          Scheduled Task

          1
          T1053

          Privilege Escalation

          Bypass User Account Control

          1
          T1088

          Scheduled Task

          1
          T1053

          Defense Evasion

          Bypass User Account Control

          1
          T1088

          Disabling Security Tools

          1
          T1089

          Modify Registry

          4
          T1112

          Virtualization/Sandbox Evasion

          2
          T1497

          Discovery

          Query Registry

          5
          T1012

          Virtualization/Sandbox Evasion

          2
          T1497

          System Information Discovery

          4
          T1082

          Peripheral Device Discovery

          1
          T1120

          Collection

          Email Collection

          1
          T1114

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmp147B.tmp.bat
            Filesize

            151B

            MD5

            d042c75ad7219a5988419c0f38dee87e

            SHA1

            98d723e48af5d2949d1e6865f9d36a282fc1c99a

            SHA256

            d0a722cb28fd37fed6f8aa819c3876705c94ab09df7c90befe061a1c08bcfb82

            SHA512

            2e8600a5f926da6728898b9f660e24df265469ec06e3ba50257dcb6f3a777168dc9ea3b4f0669cd9c1313fb0a87be4b2a2e465cb8cbc3de155f2efdf791b43de

          • C:\Users\Admin\AppData\Local\Temp\tmp147B.tmp.bat
            Filesize

            151B

            MD5

            d042c75ad7219a5988419c0f38dee87e

            SHA1

            98d723e48af5d2949d1e6865f9d36a282fc1c99a

            SHA256

            d0a722cb28fd37fed6f8aa819c3876705c94ab09df7c90befe061a1c08bcfb82

            SHA512

            2e8600a5f926da6728898b9f660e24df265469ec06e3ba50257dcb6f3a777168dc9ea3b4f0669cd9c1313fb0a87be4b2a2e465cb8cbc3de155f2efdf791b43de

          • C:\Users\Admin\AppData\Roaming\svchost.exe
            Filesize

            390KB

            MD5

            66244fb1118f70553439a5afc47529ac

            SHA1

            68250dcc265970b31d6fed79c008fe0972eec12c

            SHA256

            8973a01c5fb01195763577375cc5e3b223c5ed680cbd646a0924cbcb37150ebb

            SHA512

            8cd236ee3ab5ce209264cdbb3d00acc4399489474e47ef6e231d76fdd704a07b4060ca20e46f5e2ea618963dd4cb38fe38c4e91b42e79b7c2bdc68756d3719cb

          • C:\Users\Admin\AppData\Roaming\svchost.exe
            Filesize

            390KB

            MD5

            66244fb1118f70553439a5afc47529ac

            SHA1

            68250dcc265970b31d6fed79c008fe0972eec12c

            SHA256

            8973a01c5fb01195763577375cc5e3b223c5ed680cbd646a0924cbcb37150ebb

            SHA512

            8cd236ee3ab5ce209264cdbb3d00acc4399489474e47ef6e231d76fdd704a07b4060ca20e46f5e2ea618963dd4cb38fe38c4e91b42e79b7c2bdc68756d3719cb

          • \Users\Admin\AppData\Roaming\svchost.exe
            Filesize

            390KB

            MD5

            66244fb1118f70553439a5afc47529ac

            SHA1

            68250dcc265970b31d6fed79c008fe0972eec12c

            SHA256

            8973a01c5fb01195763577375cc5e3b223c5ed680cbd646a0924cbcb37150ebb

            SHA512

            8cd236ee3ab5ce209264cdbb3d00acc4399489474e47ef6e231d76fdd704a07b4060ca20e46f5e2ea618963dd4cb38fe38c4e91b42e79b7c2bdc68756d3719cb

          • memory/1160-54-0x0000000000B20000-0x0000000000B86000-memory.dmp
            Filesize

            408KB

          • memory/1160-55-0x000000001BEE0000-0x000000001BF60000-memory.dmp
            Filesize

            512KB

          • memory/1228-79-0x0000000002900000-0x0000000002980000-memory.dmp
            Filesize

            512KB

          • memory/1228-76-0x000000001B160000-0x000000001B442000-memory.dmp
            Filesize

            2.9MB

          • memory/1228-77-0x0000000001F50000-0x0000000001F58000-memory.dmp
            Filesize

            32KB

          • memory/1228-78-0x0000000002900000-0x0000000002980000-memory.dmp
            Filesize

            512KB

          • memory/1228-80-0x0000000002900000-0x0000000002980000-memory.dmp
            Filesize

            512KB

          • memory/1492-81-0x0000000000400000-0x0000000000426000-memory.dmp
            Filesize

            152KB

          • memory/1492-85-0x0000000000400000-0x0000000000426000-memory.dmp
            Filesize

            152KB

          • memory/1492-83-0x0000000000400000-0x0000000000426000-memory.dmp
            Filesize

            152KB

          • memory/1492-86-0x0000000004D00000-0x0000000004D40000-memory.dmp
            Filesize

            256KB

          • memory/1492-87-0x0000000004D00000-0x0000000004D40000-memory.dmp
            Filesize

            256KB

          • memory/1648-70-0x00000000011F0000-0x0000000001270000-memory.dmp
            Filesize

            512KB

          • memory/1648-69-0x0000000001270000-0x00000000012D6000-memory.dmp
            Filesize

            408KB