Analysis

  • max time kernel
    122s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 10:24

General

  • Target

    PV-20231807.exe

  • Size

    508KB

  • MD5

    5d55280d5e6d3b17ac87cdb46098ec00

  • SHA1

    bdd7eb75311685a840f9b24c3cedb12fc0c8d69f

  • SHA256

    2c70aee0f3f97fc0c454253425ce94833d2612757c435dc180d2ebf2eff4610a

  • SHA512

    776ed91a6e2b67bf8cc91a1c48e0789ea114bd359e7bb0db16771709f5231d49dcb566aa2eae940e92b8f3dc2c37d475a058006c6bd83cc224489340325e7c72

  • SSDEEP

    12288:kYCvoZWKR0+4xwoKX5PyPXkntMo7gh+y3ljL:hCvoZ3x4GokyPetMosh+qjL

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PV-20231807.exe
    "C:\Users\Admin\AppData\Local\Temp\PV-20231807.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • outlook_office_path
    • outlook_win_path
    PID:1668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1668-0-0x00000000011E0000-0x0000000001264000-memory.dmp

    Filesize

    528KB

  • memory/1668-1-0x0000000074D30000-0x000000007541E000-memory.dmp

    Filesize

    6.9MB

  • memory/1668-2-0x0000000004CB0000-0x0000000004CF0000-memory.dmp

    Filesize

    256KB

  • memory/1668-3-0x00000000002D0000-0x00000000002E6000-memory.dmp

    Filesize

    88KB

  • memory/1668-4-0x0000000074D30000-0x000000007541E000-memory.dmp

    Filesize

    6.9MB

  • memory/1668-5-0x0000000004CB0000-0x0000000004CF0000-memory.dmp

    Filesize

    256KB

  • memory/1668-6-0x00000000003F0000-0x0000000000400000-memory.dmp

    Filesize

    64KB

  • memory/1668-7-0x0000000005350000-0x00000000053B0000-memory.dmp

    Filesize

    384KB

  • memory/1668-8-0x0000000000630000-0x0000000000654000-memory.dmp

    Filesize

    144KB