Analysis

  • max time kernel
    141s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 16:57

General

  • Target

    2efb7a094b303bdb0caf62dd8d676963.exe

  • Size

    844KB

  • MD5

    2efb7a094b303bdb0caf62dd8d676963

  • SHA1

    70a4fdaff3eb7dcefe8b472a515341ad216c2e49

  • SHA256

    14b33650cf6497ab5a9f973f61ca8b43ad33a0b1a85f378345f51855567f4d2a

  • SHA512

    5f930d4be2c259a40ec1abf2102124e36f2c17f2026ee5d23b868e9ea9c5efeee17e09eb955d2594bcaa668778d5ff00c6d2950935802e370ab99f32af42d6b9

  • SSDEEP

    12288:b2VrmcC2EsNa7iS/d348n0PhybuVj5T8h7GzULMMENOvgfXtUKA4qX:MrzVhlS/d3j6Vj5ghp2NOYqKS

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2efb7a094b303bdb0caf62dd8d676963.exe
    "C:\Users\Admin\AppData\Local\Temp\2efb7a094b303bdb0caf62dd8d676963.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4896
    • C:\Users\Admin\AppData\Local\Temp\2efb7a094b303bdb0caf62dd8d676963.exe
      "C:\Users\Admin\AppData\Local\Temp\2efb7a094b303bdb0caf62dd8d676963.exe"
      2⤵
        PID:4772
      • C:\Users\Admin\AppData\Local\Temp\2efb7a094b303bdb0caf62dd8d676963.exe
        "C:\Users\Admin\AppData\Local\Temp\2efb7a094b303bdb0caf62dd8d676963.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4232
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 1816
          3⤵
          • Program crash
          PID:4836
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4232 -ip 4232
      1⤵
        PID:956

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4232-12-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB

      • memory/4232-17-0x0000000074B30000-0x00000000752E0000-memory.dmp

        Filesize

        7.7MB

      • memory/4232-16-0x0000000005550000-0x0000000005560000-memory.dmp

        Filesize

        64KB

      • memory/4232-13-0x0000000074B30000-0x00000000752E0000-memory.dmp

        Filesize

        7.7MB

      • memory/4896-4-0x0000000004CC0000-0x0000000004D5C000-memory.dmp

        Filesize

        624KB

      • memory/4896-5-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/4896-6-0x0000000004BE0000-0x0000000004BEA000-memory.dmp

        Filesize

        40KB

      • memory/4896-7-0x0000000002450000-0x0000000002462000-memory.dmp

        Filesize

        72KB

      • memory/4896-8-0x0000000074B30000-0x00000000752E0000-memory.dmp

        Filesize

        7.7MB

      • memory/4896-9-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/4896-10-0x00000000065E0000-0x0000000006672000-memory.dmp

        Filesize

        584KB

      • memory/4896-11-0x0000000005FE0000-0x0000000006004000-memory.dmp

        Filesize

        144KB

      • memory/4896-0-0x0000000000100000-0x00000000001DA000-memory.dmp

        Filesize

        872KB

      • memory/4896-3-0x0000000004C20000-0x0000000004CB2000-memory.dmp

        Filesize

        584KB

      • memory/4896-15-0x0000000074B30000-0x00000000752E0000-memory.dmp

        Filesize

        7.7MB

      • memory/4896-2-0x0000000005130000-0x00000000056D4000-memory.dmp

        Filesize

        5.6MB

      • memory/4896-1-0x0000000074B30000-0x00000000752E0000-memory.dmp

        Filesize

        7.7MB