Analysis

  • max time kernel
    131s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2023 08:19

General

  • Target

    Webxinfy.exe

  • Size

    424KB

  • MD5

    aef95313f585ac4fcf3fd9b6c489b286

  • SHA1

    d0d887a33c18e6b70f4e37fbc0e1a384b33b476c

  • SHA256

    b3dba4262136858ea1c87d1aca82830267af72efb7f509faa21dddcec066bc89

  • SHA512

    97586a81524469fdb2d49778006a7b6d42b14a871e9b346572551374692fe55ce16337240aacbacb90ea3dca0dd993e96a4303be5f037cb72df00d97f2b93704

  • SSDEEP

    6144:gVBZhKsN6+zRDQSsFv9CK5uj2rUHBwK67AfsOgy2tCeYYHrMEzvwe/vy3VXB1:gFhTOllCKsj2njAfsOgtzvZWV7

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6495173086:AAHM8NMu-uOSJHZaHij-umtWDUwi5-hOLog/sendMessage?chat_id=5262627523

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Webxinfy.exe
    "C:\Users\Admin\AppData\Local\Temp\Webxinfy.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3472
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:3392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3392-10-0x0000000140000000-0x0000000140022000-memory.dmp

    Filesize

    136KB

  • memory/3392-18-0x00000144F2230000-0x00000144F23F2000-memory.dmp

    Filesize

    1.8MB

  • memory/3392-17-0x00000144F2010000-0x00000144F2060000-memory.dmp

    Filesize

    320KB

  • memory/3392-16-0x00000144F1590000-0x00000144F15A0000-memory.dmp

    Filesize

    64KB

  • memory/3392-15-0x00007FF94D130000-0x00007FF94DBF1000-memory.dmp

    Filesize

    10.8MB

  • memory/3392-14-0x00000144F1590000-0x00000144F15A0000-memory.dmp

    Filesize

    64KB

  • memory/3392-13-0x00007FF94D130000-0x00007FF94DBF1000-memory.dmp

    Filesize

    10.8MB

  • memory/3472-4-0x00000223283E0000-0x0000022328428000-memory.dmp

    Filesize

    288KB

  • memory/3472-8-0x0000022328240000-0x0000022328250000-memory.dmp

    Filesize

    64KB

  • memory/3472-7-0x00007FF94D130000-0x00007FF94DBF1000-memory.dmp

    Filesize

    10.8MB

  • memory/3472-6-0x0000022328620000-0x000002232866C000-memory.dmp

    Filesize

    304KB

  • memory/3472-12-0x00007FF94D130000-0x00007FF94DBF1000-memory.dmp

    Filesize

    10.8MB

  • memory/3472-5-0x0000022328570000-0x00000223285A6000-memory.dmp

    Filesize

    216KB

  • memory/3472-0-0x000002230DCF0000-0x000002230DD5E000-memory.dmp

    Filesize

    440KB

  • memory/3472-3-0x0000022328240000-0x0000022328250000-memory.dmp

    Filesize

    64KB

  • memory/3472-2-0x00007FF94D130000-0x00007FF94DBF1000-memory.dmp

    Filesize

    10.8MB

  • memory/3472-1-0x000002230E110000-0x000002230E116000-memory.dmp

    Filesize

    24KB