Analysis
-
max time kernel
136s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 08:48
Static task
static1
Behavioral task
behavioral1
Sample
3f1101fc46386a1a429d486be5d8bae3.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3f1101fc46386a1a429d486be5d8bae3.exe
Resource
win10v2004-20230703-en
General
-
Target
3f1101fc46386a1a429d486be5d8bae3.exe
-
Size
365KB
-
MD5
3f1101fc46386a1a429d486be5d8bae3
-
SHA1
b7654e3c896f147d1849749e9fce418be7b28859
-
SHA256
dc9a1f9a6534e1fb2a7cdd410b0d94b8a55eebef7f26302f358c2f715fe3d30e
-
SHA512
b6ac741b5af7994bf84d9e5c20e4f0f800390792fbee11dda68ff0139fe9c4c32fe83ceb198393d976673de53abd6c07414014a9fa55c036716d358ebe877759
-
SSDEEP
6144:mDW5mfXMetOQbuRZCewRjdcxxyZkUHtl73LpsgrpeXbDIIPPCUMFulS+42:t5m/XOQyRZgdcxxyZb3LpfbEnlS+42
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.alroman.com - Port:
587 - Username:
[email protected] - Password:
abc@24638 - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/3368-142-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 47 checkip.dyndns.org 64 freegeoip.app 65 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2448 set thread context of 3368 2448 3f1101fc46386a1a429d486be5d8bae3.exe 93 -
Program crash 1 IoCs
pid pid_target Process procid_target 396 3368 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3368 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3368 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2448 wrote to memory of 3368 2448 3f1101fc46386a1a429d486be5d8bae3.exe 93 PID 2448 wrote to memory of 3368 2448 3f1101fc46386a1a429d486be5d8bae3.exe 93 PID 2448 wrote to memory of 3368 2448 3f1101fc46386a1a429d486be5d8bae3.exe 93 PID 2448 wrote to memory of 3368 2448 3f1101fc46386a1a429d486be5d8bae3.exe 93 PID 2448 wrote to memory of 3368 2448 3f1101fc46386a1a429d486be5d8bae3.exe 93 PID 2448 wrote to memory of 3368 2448 3f1101fc46386a1a429d486be5d8bae3.exe 93 PID 2448 wrote to memory of 3368 2448 3f1101fc46386a1a429d486be5d8bae3.exe 93 PID 2448 wrote to memory of 3368 2448 3f1101fc46386a1a429d486be5d8bae3.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f1101fc46386a1a429d486be5d8bae3.exe"C:\Users\Admin\AppData\Local\Temp\3f1101fc46386a1a429d486be5d8bae3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 17763⤵
- Program crash
PID:396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3368 -ip 33681⤵PID:2244