Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
03-11-2023 16:14
Static task
static1
Behavioral task
behavioral1
Sample
KFQH Blank Booking Form.bat.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
KFQH Blank Booking Form.bat.exe
Resource
win10v2004-20231020-en
General
-
Target
KFQH Blank Booking Form.bat.exe
-
Size
1.1MB
-
MD5
0efb9fa85f31cf712388fcc55484bb96
-
SHA1
e7f209e7b91a6429c0d2ee24a869751d201f4e65
-
SHA256
e54a0d1fb979d19bf7cbf681df38b284bb5b1b9a5848e220bda941e0417bc7fc
-
SHA512
d34890aa9267c0d57bc46e33107e8626f6bb08e48966b7b742e402e597716025691dfc15c5cbdece980b29c974b89440cb9af13792214fc744cb7585550cb96a
-
SSDEEP
24576:UZfxjLZisWPsuLkB/YAuseX7KvO1YAuJMi+sPV3GykDfMNVzCOgKIQtKoColK5da:0xjIPsMpAuserKvpAuJMi+sPV3GykDf0
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6708141821:AAEG0Dpkj7hEuj6EHpRMMDr5JQOvFGtpnRQ/sendMessage?chat_id=5986156290
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1944-9-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger behavioral1/memory/1944-11-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger -
Loads dropped DLL 5 IoCs
Processes:
WerFault.exepid process 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe 2184 WerFault.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2184 1768 WerFault.exe KFQH Blank Booking Form.bat.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
KFQH Blank Booking Form.bat.exedescription pid process target process PID 1768 wrote to memory of 1944 1768 KFQH Blank Booking Form.bat.exe AppLaunch.exe PID 1768 wrote to memory of 1944 1768 KFQH Blank Booking Form.bat.exe AppLaunch.exe PID 1768 wrote to memory of 1944 1768 KFQH Blank Booking Form.bat.exe AppLaunch.exe PID 1768 wrote to memory of 1944 1768 KFQH Blank Booking Form.bat.exe AppLaunch.exe PID 1768 wrote to memory of 1944 1768 KFQH Blank Booking Form.bat.exe AppLaunch.exe PID 1768 wrote to memory of 1944 1768 KFQH Blank Booking Form.bat.exe AppLaunch.exe PID 1768 wrote to memory of 1944 1768 KFQH Blank Booking Form.bat.exe AppLaunch.exe PID 1768 wrote to memory of 1944 1768 KFQH Blank Booking Form.bat.exe AppLaunch.exe PID 1768 wrote to memory of 1944 1768 KFQH Blank Booking Form.bat.exe AppLaunch.exe PID 1768 wrote to memory of 1944 1768 KFQH Blank Booking Form.bat.exe AppLaunch.exe PID 1768 wrote to memory of 1944 1768 KFQH Blank Booking Form.bat.exe AppLaunch.exe PID 1768 wrote to memory of 2184 1768 KFQH Blank Booking Form.bat.exe WerFault.exe PID 1768 wrote to memory of 2184 1768 KFQH Blank Booking Form.bat.exe WerFault.exe PID 1768 wrote to memory of 2184 1768 KFQH Blank Booking Form.bat.exe WerFault.exe PID 1768 wrote to memory of 2184 1768 KFQH Blank Booking Form.bat.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\KFQH Blank Booking Form.bat.exe"C:\Users\Admin\AppData\Local\Temp\KFQH Blank Booking Form.bat.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe2⤵PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 6042⤵
- Loads dropped DLL
- Program crash
PID:2184
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50efb9fa85f31cf712388fcc55484bb96
SHA1e7f209e7b91a6429c0d2ee24a869751d201f4e65
SHA256e54a0d1fb979d19bf7cbf681df38b284bb5b1b9a5848e220bda941e0417bc7fc
SHA512d34890aa9267c0d57bc46e33107e8626f6bb08e48966b7b742e402e597716025691dfc15c5cbdece980b29c974b89440cb9af13792214fc744cb7585550cb96a
-
Filesize
1.1MB
MD50efb9fa85f31cf712388fcc55484bb96
SHA1e7f209e7b91a6429c0d2ee24a869751d201f4e65
SHA256e54a0d1fb979d19bf7cbf681df38b284bb5b1b9a5848e220bda941e0417bc7fc
SHA512d34890aa9267c0d57bc46e33107e8626f6bb08e48966b7b742e402e597716025691dfc15c5cbdece980b29c974b89440cb9af13792214fc744cb7585550cb96a
-
Filesize
1.1MB
MD50efb9fa85f31cf712388fcc55484bb96
SHA1e7f209e7b91a6429c0d2ee24a869751d201f4e65
SHA256e54a0d1fb979d19bf7cbf681df38b284bb5b1b9a5848e220bda941e0417bc7fc
SHA512d34890aa9267c0d57bc46e33107e8626f6bb08e48966b7b742e402e597716025691dfc15c5cbdece980b29c974b89440cb9af13792214fc744cb7585550cb96a
-
Filesize
1.1MB
MD50efb9fa85f31cf712388fcc55484bb96
SHA1e7f209e7b91a6429c0d2ee24a869751d201f4e65
SHA256e54a0d1fb979d19bf7cbf681df38b284bb5b1b9a5848e220bda941e0417bc7fc
SHA512d34890aa9267c0d57bc46e33107e8626f6bb08e48966b7b742e402e597716025691dfc15c5cbdece980b29c974b89440cb9af13792214fc744cb7585550cb96a
-
Filesize
1.1MB
MD50efb9fa85f31cf712388fcc55484bb96
SHA1e7f209e7b91a6429c0d2ee24a869751d201f4e65
SHA256e54a0d1fb979d19bf7cbf681df38b284bb5b1b9a5848e220bda941e0417bc7fc
SHA512d34890aa9267c0d57bc46e33107e8626f6bb08e48966b7b742e402e597716025691dfc15c5cbdece980b29c974b89440cb9af13792214fc744cb7585550cb96a