Analysis

  • max time kernel
    91s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/01/2024, 06:03

General

  • Target

    83a382ea65d6af24d5cae40e9f9001e4.exe

  • Size

    1.2MB

  • MD5

    83a382ea65d6af24d5cae40e9f9001e4

  • SHA1

    176c4f6fa0eefa67c58699a723b6f7c7260ce33f

  • SHA256

    bd9fc23a41c4112c346a69c0a750405ff5590c1e5e7b6851eeeb6eda5a0743b6

  • SHA512

    9d303b51e87f160a8bf0aa2ee6bd36d7b169d52b1814a5e52cea9b7aea2789a2ec8a254c438202eb7078f07d1925073615738712cf69996e047ed431e01e7e13

  • SSDEEP

    24576:NuPX76DOUfx8Dgyfx8Dg6SniEXxklHpi9QV6AbwDZ5SL:QX76d58Dgy58Dg6VuQV6xZA

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83a382ea65d6af24d5cae40e9f9001e4.exe
    "C:\Users\Admin\AppData\Local\Temp\83a382ea65d6af24d5cae40e9f9001e4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Users\Admin\AppData\Local\Temp\83a382ea65d6af24d5cae40e9f9001e4.exe
      "C:\Users\Admin\AppData\Local\Temp\83a382ea65d6af24d5cae40e9f9001e4.exe"
      2⤵
        PID:1120
      • C:\Users\Admin\AppData\Local\Temp\83a382ea65d6af24d5cae40e9f9001e4.exe
        "C:\Users\Admin\AppData\Local\Temp\83a382ea65d6af24d5cae40e9f9001e4.exe"
        2⤵
          PID:3952
        • C:\Users\Admin\AppData\Local\Temp\83a382ea65d6af24d5cae40e9f9001e4.exe
          "C:\Users\Admin\AppData\Local\Temp\83a382ea65d6af24d5cae40e9f9001e4.exe"
          2⤵
            PID:4900
          • C:\Users\Admin\AppData\Local\Temp\83a382ea65d6af24d5cae40e9f9001e4.exe
            "C:\Users\Admin\AppData\Local\Temp\83a382ea65d6af24d5cae40e9f9001e4.exe"
            2⤵
              PID:5060
            • C:\Users\Admin\AppData\Local\Temp\83a382ea65d6af24d5cae40e9f9001e4.exe
              "C:\Users\Admin\AppData\Local\Temp\83a382ea65d6af24d5cae40e9f9001e4.exe"
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1300
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1300 -s 1808
                3⤵
                • Program crash
                PID:4440
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1300 -ip 1300
            1⤵
              PID:1580

            Network

                  MITRE ATT&CK Matrix

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\83a382ea65d6af24d5cae40e9f9001e4.exe.log

                    Filesize

                    1KB

                    MD5

                    8ec831f3e3a3f77e4a7b9cd32b48384c

                    SHA1

                    d83f09fd87c5bd86e045873c231c14836e76a05c

                    SHA256

                    7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

                    SHA512

                    26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

                  • memory/1300-12-0x0000000000400000-0x0000000000424000-memory.dmp

                    Filesize

                    144KB

                  • memory/1300-18-0x0000000074DD0000-0x0000000075580000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/1300-17-0x0000000005480000-0x0000000005490000-memory.dmp

                    Filesize

                    64KB

                  • memory/1300-15-0x0000000074DD0000-0x0000000075580000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/2064-4-0x0000000004E40000-0x0000000004E50000-memory.dmp

                    Filesize

                    64KB

                  • memory/2064-6-0x0000000004EF0000-0x0000000004F8C000-memory.dmp

                    Filesize

                    624KB

                  • memory/2064-7-0x0000000002420000-0x0000000002432000-memory.dmp

                    Filesize

                    72KB

                  • memory/2064-8-0x0000000074DD0000-0x0000000075580000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/2064-9-0x0000000004E40000-0x0000000004E50000-memory.dmp

                    Filesize

                    64KB

                  • memory/2064-10-0x0000000007AC0000-0x0000000007B4E000-memory.dmp

                    Filesize

                    568KB

                  • memory/2064-11-0x0000000007A40000-0x0000000007A64000-memory.dmp

                    Filesize

                    144KB

                  • memory/2064-5-0x0000000004B40000-0x0000000004B4A000-memory.dmp

                    Filesize

                    40KB

                  • memory/2064-0-0x0000000074DD0000-0x0000000075580000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/2064-3-0x0000000004B80000-0x0000000004C12000-memory.dmp

                    Filesize

                    584KB

                  • memory/2064-16-0x0000000074DD0000-0x0000000075580000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/2064-2-0x0000000005290000-0x0000000005834000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/2064-1-0x0000000000020000-0x0000000000152000-memory.dmp

                    Filesize

                    1.2MB