Analysis

  • max time kernel
    125s
  • max time network
    49s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231201-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231201-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2023 05:21

General

  • Target

    PO2012066373 -23-pages-2-3.exe

  • Size

    530KB

  • MD5

    1e9bd17b41b3d22d9f1d0ede3af18439

  • SHA1

    37cbc2fc2bb09be167af47fd22a5f51d1be73383

  • SHA256

    9a14222cf7f17d59fc5c4a1eff5fbfd662bf4d42c6355258d10e25c8f4ff8f2f

  • SHA512

    06905c18205bdfa87eb73fe050177e915502295952fd70f73edb5b258842c953b41afc18187a2370a0bd92561438dbccc74655b595e38ba3c34add9bcf462764

  • SSDEEP

    12288:KmPQaueH5qMz95lgBCDAjAFLExSdyw3xodJMqFVVU7kFtSCsqhKpkKlxdVx2:KmNqMz95OcDqAaEcFVMuACFirdVx

Malware Config

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO2012066373 -23-pages-2-3.exe
    "C:\Users\Admin\AppData\Local\Temp\PO2012066373 -23-pages-2-3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:1448
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4500
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 1408
          3⤵
          • Program crash
          PID:3652
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4500 -ip 4500
      1⤵
        PID:4628

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2180-8-0x00000000069C0000-0x00000000069CA000-memory.dmp

        Filesize

        40KB

      • memory/2180-6-0x0000000005CC0000-0x0000000005CDA000-memory.dmp

        Filesize

        104KB

      • memory/2180-2-0x0000000005D00000-0x00000000062A4000-memory.dmp

        Filesize

        5.6MB

      • memory/2180-3-0x0000000005750000-0x00000000057E2000-memory.dmp

        Filesize

        584KB

      • memory/2180-0-0x0000000000C90000-0x0000000000D1A000-memory.dmp

        Filesize

        552KB

      • memory/2180-5-0x00000000056F0000-0x00000000056FA000-memory.dmp

        Filesize

        40KB

      • memory/2180-1-0x0000000074C90000-0x0000000075440000-memory.dmp

        Filesize

        7.7MB

      • memory/2180-7-0x00000000069B0000-0x00000000069B8000-memory.dmp

        Filesize

        32KB

      • memory/2180-4-0x00000000059C0000-0x00000000059D0000-memory.dmp

        Filesize

        64KB

      • memory/2180-9-0x0000000006C40000-0x0000000006CA0000-memory.dmp

        Filesize

        384KB

      • memory/2180-10-0x0000000009260000-0x00000000092FC000-memory.dmp

        Filesize

        624KB

      • memory/2180-14-0x0000000074C90000-0x0000000075440000-memory.dmp

        Filesize

        7.7MB

      • memory/4500-13-0x0000000074C90000-0x0000000075440000-memory.dmp

        Filesize

        7.7MB

      • memory/4500-11-0x0000000000400000-0x0000000000426000-memory.dmp

        Filesize

        152KB

      • memory/4500-15-0x0000000005660000-0x0000000005670000-memory.dmp

        Filesize

        64KB

      • memory/4500-16-0x0000000074C90000-0x0000000075440000-memory.dmp

        Filesize

        7.7MB