Analysis
-
max time kernel
118s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17/01/2024, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
Order Details.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Order Details.exe
Resource
win10v2004-20231222-en
General
-
Target
Order Details.exe
-
Size
456KB
-
MD5
c65e4e6d369c8f998a827b4a916bb3b0
-
SHA1
fbc169f1791b48ed6a00ea8b91b2e2b32c91b0dd
-
SHA256
1860fb1b0d09c48a73d706886b6454756c7532f2b9cdd61564a3f79a796784e8
-
SHA512
4cbfcbc25e2f69674220fb2c92c8635bfb9736e207a6c583c616ae0ffb43d4762fe02095928ce0c4172de17c1739ad2f1ed03d559996f3428b75aef3693c68e8
-
SSDEEP
6144:48B5BAglMXudWJNwmae2374I1AqS0rFjsEBL8QEDuz0W/IWsL6/my/XsGVvYDf:J53M+dQS4IqNEyQCuz0cxsLktOf
Malware Config
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 5 IoCs
resource yara_rule behavioral1/memory/1508-7-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1508-8-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1508-11-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1508-14-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1508-16-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3044 set thread context of 1508 3044 Order Details.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1508 RegAsm.exe 1508 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1508 RegAsm.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3044 wrote to memory of 1508 3044 Order Details.exe 28 PID 3044 wrote to memory of 1508 3044 Order Details.exe 28 PID 3044 wrote to memory of 1508 3044 Order Details.exe 28 PID 3044 wrote to memory of 1508 3044 Order Details.exe 28 PID 3044 wrote to memory of 1508 3044 Order Details.exe 28 PID 3044 wrote to memory of 1508 3044 Order Details.exe 28 PID 3044 wrote to memory of 1508 3044 Order Details.exe 28 PID 3044 wrote to memory of 1508 3044 Order Details.exe 28 PID 3044 wrote to memory of 1508 3044 Order Details.exe 28 PID 3044 wrote to memory of 1508 3044 Order Details.exe 28 PID 3044 wrote to memory of 1508 3044 Order Details.exe 28 PID 3044 wrote to memory of 1508 3044 Order Details.exe 28 PID 1508 wrote to memory of 2312 1508 RegAsm.exe 31 PID 1508 wrote to memory of 2312 1508 RegAsm.exe 31 PID 1508 wrote to memory of 2312 1508 RegAsm.exe 31 PID 1508 wrote to memory of 2312 1508 RegAsm.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order Details.exe"C:\Users\Admin\AppData\Local\Temp\Order Details.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1508 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵PID:2312
-
-