Analysis Overview
SHA256
f5f16852761bc7fdf0327d60493d3910bf40f826d42b8bd84f145d5ed659ae6b
Threat Level: Known bad
The file 73938a877e6150f9e2c46a84df8c1eef.exe was found to be: Known bad.
Malicious Activity Summary
Snake Keylogger
Snake Keylogger payload
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Looks up external IP address via web service
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-08-05 09:53
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-08-05 09:53
Reported
2023-08-05 09:55
Platform
win7-20230712-en
Max time kernel
149s
Max time network
150s
Command Line
Signatures
Snake Keylogger
Snake Keylogger payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | checkip.dyndns.org | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\73938a877e6150f9e2c46a84df8c1eef.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\73938a877e6150f9e2c46a84df8c1eef.exe
"C:\Users\Admin\AppData\Local\Temp\73938a877e6150f9e2c46a84df8c1eef.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | checkip.dyndns.org | udp |
| US | 158.101.44.242:80 | checkip.dyndns.org | tcp |
Files
memory/2300-54-0x00000000009D0000-0x0000000000A6C000-memory.dmp
memory/2300-55-0x0000000074A50000-0x000000007513E000-memory.dmp
memory/2300-56-0x0000000004B80000-0x0000000004BC0000-memory.dmp
memory/2300-57-0x0000000000640000-0x000000000064C000-memory.dmp
memory/2300-58-0x0000000074A50000-0x000000007513E000-memory.dmp
memory/2300-59-0x0000000004B80000-0x0000000004BC0000-memory.dmp
memory/2300-60-0x0000000000660000-0x000000000066C000-memory.dmp
memory/2300-61-0x0000000005490000-0x00000000054F0000-memory.dmp
memory/2300-62-0x0000000002190000-0x00000000021B6000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-08-05 09:53
Reported
2023-08-05 09:55
Platform
win10v2004-20230703-en
Max time kernel
150s
Max time network
150s
Command Line
Signatures
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | checkip.dyndns.org | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\73938a877e6150f9e2c46a84df8c1eef.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\73938a877e6150f9e2c46a84df8c1eef.exe
"C:\Users\Admin\AppData\Local\Temp\73938a877e6150f9e2c46a84df8c1eef.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 158.240.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 108.211.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 59.128.231.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1.208.79.178.in-addr.arpa | udp |
| US | 8.8.8.8:53 | checkip.dyndns.org | udp |
| JP | 132.226.8.169:80 | checkip.dyndns.org | tcp |
| US | 8.8.8.8:53 | 169.8.226.132.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 126.177.238.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 63.13.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1.173.189.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
Files
memory/1128-133-0x0000000000900000-0x000000000099C000-memory.dmp
memory/1128-134-0x0000000074940000-0x00000000750F0000-memory.dmp
memory/1128-135-0x0000000005880000-0x0000000005E24000-memory.dmp
memory/1128-136-0x0000000005380000-0x0000000005412000-memory.dmp
memory/1128-137-0x0000000005520000-0x0000000005530000-memory.dmp
memory/1128-138-0x0000000005540000-0x000000000554A000-memory.dmp
memory/1128-139-0x0000000074940000-0x00000000750F0000-memory.dmp
memory/1128-140-0x0000000005520000-0x0000000005530000-memory.dmp
memory/1128-141-0x0000000009650000-0x00000000096EC000-memory.dmp
memory/1128-142-0x000000000A450000-0x000000000A612000-memory.dmp