Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 09:37

General

  • Target

    CAMSCANN.scr

  • Size

    168KB

  • MD5

    c04d39e4d40a1ea077e10d2d2b78d25d

  • SHA1

    ce37dc7a55e6eb78a7310074136d7b87c44c85eb

  • SHA256

    0ef0022fbc09c3770f6ef6268806a7baa2fbd1141cf43144196f9313cf6e2663

  • SHA512

    eb41864e2763c1338b39b2617350b0d288a5cd6572a50be84b2b86515a0bc4674518c7fb7b8a0b8412328aea88d6942c3d975951d71c3062f33c46b78029ddea

  • SSDEEP

    1536:Apka7KXz5hwQLrR27irlIPOTaAqglHPUstodIKdoUy:ApH7anbXR27iKj9gvmBy

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.avtorska.com.mk
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    avtorska2014@

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Users\Admin\AppData\Local\Temp\CAMSCANN.scr
      "C:\Users\Admin\AppData\Local\Temp\CAMSCANN.scr" /S
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Users\Admin\AppData\Local\Temp\day1.exe
        "C:\Users\Admin\AppData\Local\Temp\day1.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2428
      • C:\Users\Admin\AppData\Local\Temp\CAMSCANN.scr
        C:\Users\Admin\AppData\Local\Temp\CAMSCANN.scr
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:524
    • C:\Windows\SysWOW64\where.exe
      "C:\Windows\SysWOW64\where.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:928
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:824

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      f8a0f3f8c70d740e7ab77fd048c5bb97

      SHA1

      c0484f6199b51aa4f550f81c9e205d9f5ad7062b

      SHA256

      6e3a121c93b4d5d25e3c033e559abef1293b7ebbfe359fd220d8da41dc267c0f

      SHA512

      40dcf87eb57f39ee353609682f4953c4fe2c9dbdda7d2c15db3e8bb355c39b596667e71e50bdd18e7d24176dc1fe0b2736339074b2084770393b8cabf8323524

    • C:\Users\Admin\AppData\Local\Temp\Cab8825.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Tar8886.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Users\Admin\AppData\Local\Temp\day1.exe

      Filesize

      96KB

      MD5

      71bb9ac16c38c3a80c5d3f804a28e4f7

      SHA1

      1451bcd7eba073e6ea9a18c87e0409fc325720a3

      SHA256

      dd0e911ba194186388c0998b83ab216c912b659fff0683343f529ae194ab049c

      SHA512

      b69ad8fd6523e34e5cdf25750b3b5f12db45200e608d0b1e1c5fe6cadeb1a784f8214f2b6032cea1c87c798841012cb457660520391c4d418a089de568229798

    • C:\Users\Admin\AppData\Local\Temp\day1.exe

      Filesize

      96KB

      MD5

      71bb9ac16c38c3a80c5d3f804a28e4f7

      SHA1

      1451bcd7eba073e6ea9a18c87e0409fc325720a3

      SHA256

      dd0e911ba194186388c0998b83ab216c912b659fff0683343f529ae194ab049c

      SHA512

      b69ad8fd6523e34e5cdf25750b3b5f12db45200e608d0b1e1c5fe6cadeb1a784f8214f2b6032cea1c87c798841012cb457660520391c4d418a089de568229798

    • C:\Users\Admin\AppData\Local\Temp\yjylnt5.zip

      Filesize

      434KB

      MD5

      6366b1751087ba991f1b4188a3f38486

      SHA1

      449fab91dcd435e62a96dc4b400671ba0460a84a

      SHA256

      3102600d3ad67b0e3f132bc0f8e0e66d976ba3700c3cc96459b65a87fa57c373

      SHA512

      e1a8eb6dcfe0732299ccf74a0e61acbd132da4abac8aad996c2ba481328c0671530a55347f694f23a01a40e2343976196fc09fdd4573ab996a8a88d8e7693b90

    • \Users\Admin\AppData\Local\Temp\day1.exe

      Filesize

      96KB

      MD5

      71bb9ac16c38c3a80c5d3f804a28e4f7

      SHA1

      1451bcd7eba073e6ea9a18c87e0409fc325720a3

      SHA256

      dd0e911ba194186388c0998b83ab216c912b659fff0683343f529ae194ab049c

      SHA512

      b69ad8fd6523e34e5cdf25750b3b5f12db45200e608d0b1e1c5fe6cadeb1a784f8214f2b6032cea1c87c798841012cb457660520391c4d418a089de568229798

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      831KB

      MD5

      f4d8be409d1bd016a7b3b2580a2b90fb

      SHA1

      a68e1f6a9b2234f2269d9cf1fbda94124c428dbe

      SHA256

      d70b27121bb33012560b14a7bd597666d76193d7dc5f89e2ac5e7507240bf708

      SHA512

      9892cd38d77898fe7916a8810c82a377bbcb4f0c3f75a8295943fa29a5cb4daec95a1600a74614f31ec723967fd95721174042f2e54b12e52fe85202cdf052df

    • memory/524-84-0x0000000000850000-0x0000000000B53000-memory.dmp

      Filesize

      3.0MB

    • memory/524-85-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/524-94-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/524-95-0x00000000002B0000-0x00000000002D1000-memory.dmp

      Filesize

      132KB

    • memory/524-73-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/524-88-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/524-79-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/524-77-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/524-75-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/524-91-0x00000000002B0000-0x00000000002D1000-memory.dmp

      Filesize

      132KB

    • memory/524-89-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/928-97-0x00000000000C0000-0x00000000000FA000-memory.dmp

      Filesize

      232KB

    • memory/928-96-0x0000000001F80000-0x0000000002283000-memory.dmp

      Filesize

      3.0MB

    • memory/928-144-0x0000000061E00000-0x0000000061EBD000-memory.dmp

      Filesize

      756KB

    • memory/928-102-0x00000000007F0000-0x0000000000890000-memory.dmp

      Filesize

      640KB

    • memory/928-99-0x00000000000C0000-0x00000000000FA000-memory.dmp

      Filesize

      232KB

    • memory/928-92-0x00000000000C0000-0x00000000000FA000-memory.dmp

      Filesize

      232KB

    • memory/928-93-0x00000000000C0000-0x00000000000FA000-memory.dmp

      Filesize

      232KB

    • memory/928-98-0x00000000007F0000-0x0000000000890000-memory.dmp

      Filesize

      640KB

    • memory/1412-103-0x00000000069B0000-0x0000000006AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/1412-101-0x00000000069B0000-0x0000000006AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/1412-100-0x00000000069B0000-0x0000000006AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/1412-90-0x0000000000010000-0x0000000000020000-memory.dmp

      Filesize

      64KB

    • memory/2428-81-0x000000013FE00000-0x000000013FE1C000-memory.dmp

      Filesize

      112KB

    • memory/2428-82-0x000007FEF5BD0000-0x000007FEF65BC000-memory.dmp

      Filesize

      9.9MB

    • memory/2428-87-0x000000001B8C0000-0x000000001B940000-memory.dmp

      Filesize

      512KB

    • memory/2428-86-0x000007FEF5BD0000-0x000007FEF65BC000-memory.dmp

      Filesize

      9.9MB

    • memory/2428-83-0x000000001B8C0000-0x000000001B940000-memory.dmp

      Filesize

      512KB

    • memory/2824-65-0x0000000006550000-0x00000000065C0000-memory.dmp

      Filesize

      448KB

    • memory/2824-66-0x00000000008C0000-0x000000000090C000-memory.dmp

      Filesize

      304KB

    • memory/2824-64-0x0000000005DE0000-0x0000000005E62000-memory.dmp

      Filesize

      520KB

    • memory/2824-80-0x0000000074A80000-0x000000007516E000-memory.dmp

      Filesize

      6.9MB

    • memory/2824-0-0x0000000074A80000-0x000000007516E000-memory.dmp

      Filesize

      6.9MB

    • memory/2824-2-0x0000000004C00000-0x0000000004C40000-memory.dmp

      Filesize

      256KB

    • memory/2824-1-0x0000000000B70000-0x0000000000BA0000-memory.dmp

      Filesize

      192KB