Analysis Overview
SHA256
54bfd99c3c0f06b36fa49b7ec029a586841cfb691099df5407bd134c16ba7d5c
Threat Level: Known bad
The file 54bfd99c3c0f06b36fa49b7ec029a586841cfb691099df5407bd134c16ba7d5cexe_JC.exe was found to be: Known bad.
Malicious Activity Summary
Snakekeylogger family
Snake Keylogger
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Looks up external IP address via web service
Unsigned PE
Program crash
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-08-03 18:20
Signatures
Snakekeylogger family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-08-03 18:20
Reported
2023-08-03 18:23
Platform
win7-20230712-en
Max time kernel
117s
Max time network
120s
Command Line
Signatures
Snake Keylogger
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | checkip.dyndns.org | N/A | N/A |
| N/A | freegeoip.app | N/A | N/A |
| N/A | freegeoip.app | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\54bfd99c3c0f06b36fa49b7ec029a586841cfb691099df5407bd134c16ba7d5cexe_JC.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\54bfd99c3c0f06b36fa49b7ec029a586841cfb691099df5407bd134c16ba7d5cexe_JC.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\54bfd99c3c0f06b36fa49b7ec029a586841cfb691099df5407bd134c16ba7d5cexe_JC.exe
"C:\Users\Admin\AppData\Local\Temp\54bfd99c3c0f06b36fa49b7ec029a586841cfb691099df5407bd134c16ba7d5cexe_JC.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | checkip.dyndns.org | udp |
| JP | 132.226.8.169:80 | checkip.dyndns.org | tcp |
| US | 8.8.8.8:53 | freegeoip.app | udp |
| US | 188.114.97.0:443 | freegeoip.app | tcp |
| US | 8.8.8.8:53 | ipbase.com | udp |
| US | 75.2.60.5:443 | ipbase.com | tcp |
Files
memory/2468-54-0x00000000003A0000-0x000000000040A000-memory.dmp
memory/2468-55-0x0000000074920000-0x000000007500E000-memory.dmp
memory/2468-56-0x00000000048A0000-0x00000000048E0000-memory.dmp
memory/2468-57-0x0000000074920000-0x000000007500E000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-08-03 18:20
Reported
2023-08-03 18:23
Platform
win10v2004-20230703-en
Max time kernel
147s
Max time network
156s
Command Line
Signatures
Snake Keylogger
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | checkip.dyndns.org | N/A | N/A |
| N/A | freegeoip.app | N/A | N/A |
| N/A | freegeoip.app | N/A | N/A |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\54bfd99c3c0f06b36fa49b7ec029a586841cfb691099df5407bd134c16ba7d5cexe_JC.exe |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\54bfd99c3c0f06b36fa49b7ec029a586841cfb691099df5407bd134c16ba7d5cexe_JC.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\54bfd99c3c0f06b36fa49b7ec029a586841cfb691099df5407bd134c16ba7d5cexe_JC.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\54bfd99c3c0f06b36fa49b7ec029a586841cfb691099df5407bd134c16ba7d5cexe_JC.exe
"C:\Users\Admin\AppData\Local\Temp\54bfd99c3c0f06b36fa49b7ec029a586841cfb691099df5407bd134c16ba7d5cexe_JC.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2024 -ip 2024
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 2564
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 146.78.124.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | checkip.dyndns.org | udp |
| BR | 132.226.247.73:80 | checkip.dyndns.org | tcp |
| US | 8.8.8.8:53 | 73.247.226.132.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | freegeoip.app | udp |
| US | 188.114.96.0:443 | freegeoip.app | tcp |
| US | 8.8.8.8:53 | ipbase.com | udp |
| US | 99.83.231.61:443 | ipbase.com | tcp |
| US | 8.8.8.8:53 | 0.96.114.188.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 61.231.83.99.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 254.130.241.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 158.240.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 160.252.72.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 210.143.182.52.in-addr.arpa | udp |
Files
memory/2024-133-0x0000000000050000-0x00000000000BA000-memory.dmp
memory/2024-134-0x0000000075140000-0x00000000758F0000-memory.dmp
memory/2024-135-0x0000000005170000-0x0000000005714000-memory.dmp
memory/2024-136-0x0000000004BC0000-0x0000000004C5C000-memory.dmp
memory/2024-137-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
memory/2024-138-0x0000000075140000-0x00000000758F0000-memory.dmp
memory/2024-139-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
memory/2024-140-0x0000000006050000-0x00000000060B6000-memory.dmp
memory/2024-141-0x00000000060C0000-0x0000000006282000-memory.dmp
memory/2024-142-0x0000000075140000-0x00000000758F0000-memory.dmp