Analysis

  • max time kernel
    124s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    06/07/2023, 14:10

General

  • Target

    ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47.exe

  • Size

    1.8MB

  • MD5

    6da0f39a3b399cf76c35cdf2b7995fc1

  • SHA1

    ff6dc3a1e80e6b7538f3edc91992a071663aec0d

  • SHA256

    ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47

  • SHA512

    86e05dc8c1cc79dcb7f2105a496659dff38b72002a0ec7e29fc4f21cff9f008ee6115d4ce0e059491b15ec76d000a579c48357c68fb62055f019ceab9f4c0c08

  • SSDEEP

    24576:Lo9pJxIFZyQ2qLY4h14DYk36uC1RiJC6DtQZcKJn83R9bws:0pbIvyGJKBJC1Ri8/ZcKt8R9

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6136035762:AAGQJoq5AjGzrqugWANFmU6RNEkZGCAv7SE/sendMessage?chat_id=805410216

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 23 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 23 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47.exe
    "C:\Users\Admin\AppData\Local\Temp\ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47.exe
      "C:\Users\Admin\AppData\Local\Temp\ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:860
      • C:\Users\Admin\AppData\Local\Temp\._cache_ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:852
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2064
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe"
          4⤵
          • Executes dropped EXE
          PID:1496
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1256
          • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
            "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"
            5⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:2632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.8MB

    MD5

    6da0f39a3b399cf76c35cdf2b7995fc1

    SHA1

    ff6dc3a1e80e6b7538f3edc91992a071663aec0d

    SHA256

    ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47

    SHA512

    86e05dc8c1cc79dcb7f2105a496659dff38b72002a0ec7e29fc4f21cff9f008ee6115d4ce0e059491b15ec76d000a579c48357c68fb62055f019ceab9f4c0c08

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.8MB

    MD5

    6da0f39a3b399cf76c35cdf2b7995fc1

    SHA1

    ff6dc3a1e80e6b7538f3edc91992a071663aec0d

    SHA256

    ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47

    SHA512

    86e05dc8c1cc79dcb7f2105a496659dff38b72002a0ec7e29fc4f21cff9f008ee6115d4ce0e059491b15ec76d000a579c48357c68fb62055f019ceab9f4c0c08

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.8MB

    MD5

    6da0f39a3b399cf76c35cdf2b7995fc1

    SHA1

    ff6dc3a1e80e6b7538f3edc91992a071663aec0d

    SHA256

    ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47

    SHA512

    86e05dc8c1cc79dcb7f2105a496659dff38b72002a0ec7e29fc4f21cff9f008ee6115d4ce0e059491b15ec76d000a579c48357c68fb62055f019ceab9f4c0c08

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.8MB

    MD5

    6da0f39a3b399cf76c35cdf2b7995fc1

    SHA1

    ff6dc3a1e80e6b7538f3edc91992a071663aec0d

    SHA256

    ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47

    SHA512

    86e05dc8c1cc79dcb7f2105a496659dff38b72002a0ec7e29fc4f21cff9f008ee6115d4ce0e059491b15ec76d000a579c48357c68fb62055f019ceab9f4c0c08

  • C:\ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.8MB

    MD5

    6da0f39a3b399cf76c35cdf2b7995fc1

    SHA1

    ff6dc3a1e80e6b7538f3edc91992a071663aec0d

    SHA256

    ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47

    SHA512

    86e05dc8c1cc79dcb7f2105a496659dff38b72002a0ec7e29fc4f21cff9f008ee6115d4ce0e059491b15ec76d000a579c48357c68fb62055f019ceab9f4c0c08

  • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

    Filesize

    127KB

    MD5

    02adb9722a0565227fd2f5d9e2203559

    SHA1

    cf9183c13f677f2effbd839498c292d165bec57c

    SHA256

    a157b66148722c2f558b4946c120ccca8681cf2c5d51f43483732e3ec7c561e0

    SHA512

    ae3be2f4e3f3cfc65ca8c00dd5a54eaba2031da27a18bb0f7b8d19da6defd35764182f9a0f6f29a02e252d297dea1765f5ac675c623a3b5961db9c37c2c81e92

  • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

    Filesize

    127KB

    MD5

    02adb9722a0565227fd2f5d9e2203559

    SHA1

    cf9183c13f677f2effbd839498c292d165bec57c

    SHA256

    a157b66148722c2f558b4946c120ccca8681cf2c5d51f43483732e3ec7c561e0

    SHA512

    ae3be2f4e3f3cfc65ca8c00dd5a54eaba2031da27a18bb0f7b8d19da6defd35764182f9a0f6f29a02e252d297dea1765f5ac675c623a3b5961db9c37c2c81e92

  • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

    Filesize

    127KB

    MD5

    02adb9722a0565227fd2f5d9e2203559

    SHA1

    cf9183c13f677f2effbd839498c292d165bec57c

    SHA256

    a157b66148722c2f558b4946c120ccca8681cf2c5d51f43483732e3ec7c561e0

    SHA512

    ae3be2f4e3f3cfc65ca8c00dd5a54eaba2031da27a18bb0f7b8d19da6defd35764182f9a0f6f29a02e252d297dea1765f5ac675c623a3b5961db9c37c2c81e92

  • C:\Users\Admin\AppData\Local\Temp\._cache_ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47.exe

    Filesize

    127KB

    MD5

    02adb9722a0565227fd2f5d9e2203559

    SHA1

    cf9183c13f677f2effbd839498c292d165bec57c

    SHA256

    a157b66148722c2f558b4946c120ccca8681cf2c5d51f43483732e3ec7c561e0

    SHA512

    ae3be2f4e3f3cfc65ca8c00dd5a54eaba2031da27a18bb0f7b8d19da6defd35764182f9a0f6f29a02e252d297dea1765f5ac675c623a3b5961db9c37c2c81e92

  • C:\Users\Admin\AppData\Local\Temp\._cache_ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47.exe

    Filesize

    127KB

    MD5

    02adb9722a0565227fd2f5d9e2203559

    SHA1

    cf9183c13f677f2effbd839498c292d165bec57c

    SHA256

    a157b66148722c2f558b4946c120ccca8681cf2c5d51f43483732e3ec7c561e0

    SHA512

    ae3be2f4e3f3cfc65ca8c00dd5a54eaba2031da27a18bb0f7b8d19da6defd35764182f9a0f6f29a02e252d297dea1765f5ac675c623a3b5961db9c37c2c81e92

  • \ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.8MB

    MD5

    6da0f39a3b399cf76c35cdf2b7995fc1

    SHA1

    ff6dc3a1e80e6b7538f3edc91992a071663aec0d

    SHA256

    ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47

    SHA512

    86e05dc8c1cc79dcb7f2105a496659dff38b72002a0ec7e29fc4f21cff9f008ee6115d4ce0e059491b15ec76d000a579c48357c68fb62055f019ceab9f4c0c08

  • \ProgramData\Synaptics\Synaptics.exe

    Filesize

    1.8MB

    MD5

    6da0f39a3b399cf76c35cdf2b7995fc1

    SHA1

    ff6dc3a1e80e6b7538f3edc91992a071663aec0d

    SHA256

    ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47

    SHA512

    86e05dc8c1cc79dcb7f2105a496659dff38b72002a0ec7e29fc4f21cff9f008ee6115d4ce0e059491b15ec76d000a579c48357c68fb62055f019ceab9f4c0c08

  • \Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

    Filesize

    127KB

    MD5

    02adb9722a0565227fd2f5d9e2203559

    SHA1

    cf9183c13f677f2effbd839498c292d165bec57c

    SHA256

    a157b66148722c2f558b4946c120ccca8681cf2c5d51f43483732e3ec7c561e0

    SHA512

    ae3be2f4e3f3cfc65ca8c00dd5a54eaba2031da27a18bb0f7b8d19da6defd35764182f9a0f6f29a02e252d297dea1765f5ac675c623a3b5961db9c37c2c81e92

  • \Users\Admin\AppData\Local\Temp\._cache_ee40d36750eae21bca0d894d54cdcacf61f1b14a3224afa4d6ed9284ea941b47.exe

    Filesize

    127KB

    MD5

    02adb9722a0565227fd2f5d9e2203559

    SHA1

    cf9183c13f677f2effbd839498c292d165bec57c

    SHA256

    a157b66148722c2f558b4946c120ccca8681cf2c5d51f43483732e3ec7c561e0

    SHA512

    ae3be2f4e3f3cfc65ca8c00dd5a54eaba2031da27a18bb0f7b8d19da6defd35764182f9a0f6f29a02e252d297dea1765f5ac675c623a3b5961db9c37c2c81e92

  • memory/852-94-0x0000000000860000-0x0000000000886000-memory.dmp

    Filesize

    152KB

  • memory/852-96-0x000000001AEF0000-0x000000001AF70000-memory.dmp

    Filesize

    512KB

  • memory/852-98-0x000000001AEF0000-0x000000001AF70000-memory.dmp

    Filesize

    512KB

  • memory/860-68-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/860-61-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/860-75-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/860-71-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/860-70-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/860-69-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/860-67-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/860-74-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/860-66-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/860-92-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/860-62-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/860-65-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/860-64-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/860-63-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/1256-120-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/1256-129-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/1256-107-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1256-127-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/1256-111-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/1256-126-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/1256-125-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/1256-124-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/1256-122-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/2064-97-0x0000000005010000-0x0000000005050000-memory.dmp

    Filesize

    256KB

  • memory/2064-93-0x00000000010C0000-0x0000000001298000-memory.dmp

    Filesize

    1.8MB

  • memory/2064-95-0x0000000005010000-0x0000000005050000-memory.dmp

    Filesize

    256KB

  • memory/2336-56-0x0000000000960000-0x0000000000972000-memory.dmp

    Filesize

    72KB

  • memory/2336-55-0x0000000004DD0000-0x0000000004E10000-memory.dmp

    Filesize

    256KB

  • memory/2336-57-0x0000000004DD0000-0x0000000004E10000-memory.dmp

    Filesize

    256KB

  • memory/2336-58-0x00000000009D0000-0x00000000009DC000-memory.dmp

    Filesize

    48KB

  • memory/2336-59-0x0000000005DE0000-0x0000000005F0A000-memory.dmp

    Filesize

    1.2MB

  • memory/2336-60-0x0000000005950000-0x0000000005A48000-memory.dmp

    Filesize

    992KB

  • memory/2336-54-0x0000000001230000-0x0000000001408000-memory.dmp

    Filesize

    1.8MB

  • memory/2632-121-0x0000000000E90000-0x0000000000EB6000-memory.dmp

    Filesize

    152KB

  • memory/2632-123-0x0000000000E10000-0x0000000000E90000-memory.dmp

    Filesize

    512KB

  • memory/2632-128-0x0000000000E10000-0x0000000000E90000-memory.dmp

    Filesize

    512KB