Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 23:05

General

  • Target

    1806d15fd4ad27772df69d88f34a72a0.exe

  • Size

    1001KB

  • MD5

    1806d15fd4ad27772df69d88f34a72a0

  • SHA1

    ba82b8081281bbf470c9f7eeba4dcec7b29032a1

  • SHA256

    49bf307264bfd9daffaaa91e8b45db7e191f63458570acfd32548f123d33a3b4

  • SHA512

    b87bc9e9a2816d651b1a2865fd5861a9061a031fc507dcbb82c2871c7af05be4b12434b6afeb548fbe0fd516138415600bfb2fe1b23fe67972a5925ab435ac1e

  • SSDEEP

    24576:2Zs/xzN9a5RY/d3luK64JdlpKlXy/G8AdBYsB:2Zs/ta5RXK64Jwmgv

Malware Config

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 8 IoCs
  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1806d15fd4ad27772df69d88f34a72a0.exe
    "C:\Users\Admin\AppData\Local\Temp\1806d15fd4ad27772df69d88f34a72a0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Users\Admin\AppData\Local\Temp\1806d15fd4ad27772df69d88f34a72a0.exe
      "C:\Users\Admin\AppData\Local\Temp\1806d15fd4ad27772df69d88f34a72a0.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 1520
        3⤵
        • Program crash
        PID:2932

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2652-23-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2652-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2652-13-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2652-11-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2652-27-0x0000000074B80000-0x000000007526E000-memory.dmp

    Filesize

    6.9MB

  • memory/2652-26-0x0000000004C60000-0x0000000004CA0000-memory.dmp

    Filesize

    256KB

  • memory/2652-25-0x0000000074B80000-0x000000007526E000-memory.dmp

    Filesize

    6.9MB

  • memory/2652-21-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2652-15-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2652-9-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2652-28-0x0000000004C60000-0x0000000004CA0000-memory.dmp

    Filesize

    256KB

  • memory/2652-19-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2892-6-0x0000000004E20000-0x0000000004E88000-memory.dmp

    Filesize

    416KB

  • memory/2892-8-0x0000000000590000-0x00000000005B4000-memory.dmp

    Filesize

    144KB

  • memory/2892-2-0x0000000004E80000-0x0000000004EC0000-memory.dmp

    Filesize

    256KB

  • memory/2892-0-0x0000000000A50000-0x0000000000B50000-memory.dmp

    Filesize

    1024KB

  • memory/2892-7-0x0000000001FC0000-0x0000000001FE6000-memory.dmp

    Filesize

    152KB

  • memory/2892-24-0x0000000074B80000-0x000000007526E000-memory.dmp

    Filesize

    6.9MB

  • memory/2892-1-0x0000000074B80000-0x000000007526E000-memory.dmp

    Filesize

    6.9MB

  • memory/2892-5-0x0000000004E80000-0x0000000004EC0000-memory.dmp

    Filesize

    256KB

  • memory/2892-4-0x0000000074B80000-0x000000007526E000-memory.dmp

    Filesize

    6.9MB

  • memory/2892-3-0x00000000003A0000-0x00000000003B2000-memory.dmp

    Filesize

    72KB