Analysis

  • max time kernel
    143s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2023 12:01

General

  • Target

    Uecqyndauhl.exe

  • Size

    837KB

  • MD5

    7af8d321a3c0d9a27f7a9ab29ad5b16a

  • SHA1

    29e56ec4934fab9865fbd4d41698840fefd8b33d

  • SHA256

    8f0f73da0cf00759da7bdb027e9f33abfd04617d19ec3d574901b1eb36e21078

  • SHA512

    9f8b8f7be56ed8721c4a21f7fffc82b0f8a592f7b3871f55191a9355f6e8c838a8c6e7c61ef12ae4334445a3617250741ad24f42b276062bc368832eabad2a04

  • SSDEEP

    12288:b/y7FGqvrNujgr+w6u17Xh6uROvKDGSIlQVSjZfQg4lToURIUh9mJRJPZ6JvC7R6:ruGq0grx16uYvKslQERJ7PAqN7

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5651670986:AAHpwwN-ny7apM0yBwQlweVd-JZOihDUBEA/sendMessage?chat_id=5716598986

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uecqyndauhl.exe
    "C:\Users\Admin\AppData\Local\Temp\Uecqyndauhl.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2692-1085-0x00007FFF2B320000-0x00007FFF2BDE1000-memory.dmp

    Filesize

    10.8MB

  • memory/2692-1092-0x0000025EFA420000-0x0000025EFA430000-memory.dmp

    Filesize

    64KB

  • memory/2692-1091-0x00007FFF2B320000-0x00007FFF2BDE1000-memory.dmp

    Filesize

    10.8MB

  • memory/2692-1090-0x0000025EFA700000-0x0000025EFA8C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2692-1089-0x0000025EFA1B0000-0x0000025EFA200000-memory.dmp

    Filesize

    320KB

  • memory/2692-1088-0x0000025EFA420000-0x0000025EFA430000-memory.dmp

    Filesize

    64KB

  • memory/2692-1087-0x0000000140000000-0x0000000140022000-memory.dmp

    Filesize

    136KB

  • memory/4888-40-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-50-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-14-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-16-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-18-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-20-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-22-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-24-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-26-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-28-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-30-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-32-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-34-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-36-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-38-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-0-0x0000018EA2500000-0x0000018EA25D4000-memory.dmp

    Filesize

    848KB

  • memory/4888-42-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-44-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-46-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-12-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-48-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-52-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-54-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-56-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-58-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-60-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-62-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-64-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-66-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-1057-0x00007FFF2B320000-0x00007FFF2BDE1000-memory.dmp

    Filesize

    10.8MB

  • memory/4888-1080-0x0000018EBDC60000-0x0000018EBDC61000-memory.dmp

    Filesize

    4KB

  • memory/4888-1081-0x0000018EBCDA0000-0x0000018EBCDB0000-memory.dmp

    Filesize

    64KB

  • memory/4888-10-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-1086-0x00007FFF2B320000-0x00007FFF2BDE1000-memory.dmp

    Filesize

    10.8MB

  • memory/4888-8-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-6-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-4-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-3-0x0000018EBDBA0000-0x0000018EBDC57000-memory.dmp

    Filesize

    732KB

  • memory/4888-2-0x0000018EBCDA0000-0x0000018EBCDB0000-memory.dmp

    Filesize

    64KB

  • memory/4888-1-0x00007FFF2B320000-0x00007FFF2BDE1000-memory.dmp

    Filesize

    10.8MB