Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
03-08-2023 15:43
Behavioral task
behavioral1
Sample
3410529d02cdc6ee212c44cdae46c2c0.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3410529d02cdc6ee212c44cdae46c2c0.exe
Resource
win10v2004-20230703-en
General
-
Target
3410529d02cdc6ee212c44cdae46c2c0.exe
-
Size
127KB
-
MD5
3410529d02cdc6ee212c44cdae46c2c0
-
SHA1
7061a945f2786bf28191f856d8566ea9d61e7869
-
SHA256
7d11e19dcc4a6891657f624485dfd6e3e0ed3f0cd1a4361cc922ebb95d7361ac
-
SHA512
77459455e89eb954dfb943e9ee1544055fb6e010ff9050f3c4ac3aac2f655132183f9474755825647896df55457878f1b7f6d41b4aee19a99fd8ab775c035dcb
-
SSDEEP
1536:OhrMBR29HM9mZ0kp08+vBUFrlYYnz7mrMSz+m4IsrMFPyKvn02bEb/zRWn6tlkpd:OhryR6sBkpznz5b7Rk6tlOwBINzgbY
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.sienkakupeste.com - Port:
587 - Username:
[email protected] - Password:
010203sienka++ - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral1/memory/1788-54-0x0000000000D40000-0x0000000000D66000-memory.dmp family_snakekeylogger -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 checkip.dyndns.org -
Program crash 1 IoCs
pid pid_target Process procid_target 1640 1788 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1788 3410529d02cdc6ee212c44cdae46c2c0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1788 3410529d02cdc6ee212c44cdae46c2c0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1788 wrote to memory of 1640 1788 3410529d02cdc6ee212c44cdae46c2c0.exe 30 PID 1788 wrote to memory of 1640 1788 3410529d02cdc6ee212c44cdae46c2c0.exe 30 PID 1788 wrote to memory of 1640 1788 3410529d02cdc6ee212c44cdae46c2c0.exe 30 PID 1788 wrote to memory of 1640 1788 3410529d02cdc6ee212c44cdae46c2c0.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3410529d02cdc6ee212c44cdae46c2c0.exe"C:\Users\Admin\AppData\Local\Temp\3410529d02cdc6ee212c44cdae46c2c0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 10482⤵
- Program crash
PID:1640
-