Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
751f72c8da469f5b6b562698dc2f57c3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
751f72c8da469f5b6b562698dc2f57c3.exe
Resource
win10v2004-20231215-en
General
-
Target
751f72c8da469f5b6b562698dc2f57c3.exe
-
Size
591KB
-
MD5
751f72c8da469f5b6b562698dc2f57c3
-
SHA1
2db42618de80d2f43e27aa1fac5a7af8c0d702f9
-
SHA256
19fe0e2a4195505e4414a206d346cdc01c9c4c879afaa502aae4706d11719452
-
SHA512
43f193e58fa561e94a1b6786938e7cfb371924dd378cd276ef2c9ec65bb3c99b215f55a24445fd591c54d31c34c468a344cd5bb11064f0fb80c70bde52057b69
-
SSDEEP
6144:dNUZhUpSFJLgGj9jv4oeEGRuYuSL9MQfXaxnY5n7Z2GtvWrLl5l:deZh6Y/eEAnuSOQIslnkl5l
Malware Config
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/2584-10-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger behavioral1/memory/2584-12-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger behavioral1/memory/2584-16-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger behavioral1/memory/2584-18-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger behavioral1/memory/2584-20-0x0000000000400000-0x0000000000424000-memory.dmp family_snakekeylogger behavioral1/memory/2584-23-0x00000000006D0000-0x0000000000710000-memory.dmp family_snakekeylogger behavioral1/memory/2584-25-0x00000000006D0000-0x0000000000710000-memory.dmp family_snakekeylogger -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 freegeoip.app 4 checkip.dyndns.org 8 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
Processes:
751f72c8da469f5b6b562698dc2f57c3.exedescription pid Process procid_target PID 1436 set thread context of 2584 1436 751f72c8da469f5b6b562698dc2f57c3.exe 30 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 3000 2584 WerFault.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
751f72c8da469f5b6b562698dc2f57c3.exepid Process 2584 751f72c8da469f5b6b562698dc2f57c3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
751f72c8da469f5b6b562698dc2f57c3.exedescription pid Process Token: SeDebugPrivilege 2584 751f72c8da469f5b6b562698dc2f57c3.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
751f72c8da469f5b6b562698dc2f57c3.exe751f72c8da469f5b6b562698dc2f57c3.exedescription pid Process procid_target PID 1436 wrote to memory of 2584 1436 751f72c8da469f5b6b562698dc2f57c3.exe 30 PID 1436 wrote to memory of 2584 1436 751f72c8da469f5b6b562698dc2f57c3.exe 30 PID 1436 wrote to memory of 2584 1436 751f72c8da469f5b6b562698dc2f57c3.exe 30 PID 1436 wrote to memory of 2584 1436 751f72c8da469f5b6b562698dc2f57c3.exe 30 PID 1436 wrote to memory of 2584 1436 751f72c8da469f5b6b562698dc2f57c3.exe 30 PID 1436 wrote to memory of 2584 1436 751f72c8da469f5b6b562698dc2f57c3.exe 30 PID 1436 wrote to memory of 2584 1436 751f72c8da469f5b6b562698dc2f57c3.exe 30 PID 1436 wrote to memory of 2584 1436 751f72c8da469f5b6b562698dc2f57c3.exe 30 PID 1436 wrote to memory of 2584 1436 751f72c8da469f5b6b562698dc2f57c3.exe 30 PID 2584 wrote to memory of 3000 2584 751f72c8da469f5b6b562698dc2f57c3.exe 31 PID 2584 wrote to memory of 3000 2584 751f72c8da469f5b6b562698dc2f57c3.exe 31 PID 2584 wrote to memory of 3000 2584 751f72c8da469f5b6b562698dc2f57c3.exe 31 PID 2584 wrote to memory of 3000 2584 751f72c8da469f5b6b562698dc2f57c3.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\751f72c8da469f5b6b562698dc2f57c3.exe"C:\Users\Admin\AppData\Local\Temp\751f72c8da469f5b6b562698dc2f57c3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\751f72c8da469f5b6b562698dc2f57c3.exe"C:\Users\Admin\AppData\Local\Temp\751f72c8da469f5b6b562698dc2f57c3.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 16203⤵
- Program crash
PID:3000
-
-