Analysis

  • max time kernel
    140s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2023, 07:52

General

  • Target

    Commkkhwb.exe

  • Size

    68KB

  • MD5

    9978b4e89a86b7e659e6d50737a5a2e3

  • SHA1

    ae5553562926cdefd411108d898fed36ed69bede

  • SHA256

    e74eac907deb295455e5856a2f4030c175a134dd3f2d681cec2d59ebb387c275

  • SHA512

    55b64faf8aec29f2e5600a8f83cf366f080d63cfec26d767760d9f48774b177e54767b84f6916bee585e4c8020c4a49dc53dc2fb59af898175b2b2cf81e473f2

  • SSDEEP

    768:m4GpAgE5/XuIHDI0w7yrSAllWoqEqRyflqFwH9SKzaDq/qTplPWrFDF+84PB0/tv:aAgkuOuyrzlhl8c/ti6GCKoqi

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6566589691:AAFApTT4-vdsgK7fcVU9cwFelVxNx3knl8M/sendMessage?chat_id=5582419717

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Commkkhwb.exe
    "C:\Users\Admin\AppData\Local\Temp\Commkkhwb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4564
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:3276

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3276-14-0x0000024B98230000-0x0000024B98280000-memory.dmp

          Filesize

          320KB

        • memory/3276-11-0x00007FFDD82F0000-0x00007FFDD8DB1000-memory.dmp

          Filesize

          10.8MB

        • memory/3276-17-0x0000024BB0BA0000-0x0000024BB0BB0000-memory.dmp

          Filesize

          64KB

        • memory/3276-16-0x00007FFDD82F0000-0x00007FFDD8DB1000-memory.dmp

          Filesize

          10.8MB

        • memory/3276-15-0x0000024BB0EC0000-0x0000024BB1082000-memory.dmp

          Filesize

          1.8MB

        • memory/3276-13-0x0000024BB0BA0000-0x0000024BB0BB0000-memory.dmp

          Filesize

          64KB

        • memory/3276-9-0x0000000140000000-0x0000000140022000-memory.dmp

          Filesize

          136KB

        • memory/4564-4-0x000001A830ED0000-0x000001A830F06000-memory.dmp

          Filesize

          216KB

        • memory/4564-1-0x00007FFDD82F0000-0x00007FFDD8DB1000-memory.dmp

          Filesize

          10.8MB

        • memory/4564-7-0x000001A816AF0000-0x000001A816B00000-memory.dmp

          Filesize

          64KB

        • memory/4564-12-0x00007FFDD82F0000-0x00007FFDD8DB1000-memory.dmp

          Filesize

          10.8MB

        • memory/4564-5-0x000001A830F80000-0x000001A830FCC000-memory.dmp

          Filesize

          304KB

        • memory/4564-0-0x000001A8166C0000-0x000001A8166D6000-memory.dmp

          Filesize

          88KB

        • memory/4564-6-0x00007FFDD82F0000-0x00007FFDD8DB1000-memory.dmp

          Filesize

          10.8MB

        • memory/4564-3-0x000001A830E80000-0x000001A830EC8000-memory.dmp

          Filesize

          288KB

        • memory/4564-2-0x000001A816AF0000-0x000001A816B00000-memory.dmp

          Filesize

          64KB