Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
cb64dddceb29c15b7c0b1c346b0c81ed.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb64dddceb29c15b7c0b1c346b0c81ed.exe
Resource
win10v2004-20240226-en
General
-
Target
cb64dddceb29c15b7c0b1c346b0c81ed.exe
-
Size
833KB
-
MD5
cb64dddceb29c15b7c0b1c346b0c81ed
-
SHA1
9778d888d49c13dd3ce071ed60dbd20d5859eb51
-
SHA256
9a3cccbf3ec54e526e6979adac8e32294a092ad0374ed8254bebbe525c63551a
-
SHA512
e539b2e0e9b4d09d304ff334cd5c081a8509571dfc47ed57b9df7c8806de14b8f2c3dc7c345552874d3fd60066ad3e76834d28f62568cd623876fa46d139e9bf
-
SSDEEP
12288:6stYdODLqJmNuoLUzJtd6f7G+ubJT7rarB/oGrr6zJelbefCIx:6stY4PTUWfXuN/yxmzAbefCIx
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
alexfoxfreight.com - Port:
587 - Username:
[email protected] - Password:
Ueos*93sj!#!12 - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 6 IoCs
resource yara_rule behavioral1/memory/2640-10-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2640-12-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2640-16-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2640-18-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2640-20-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2640-23-0x0000000000670000-0x00000000006B0000-memory.dmp family_snakekeylogger -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org 8 freegeoip.app 9 freegeoip.app -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2008 set thread context of 2640 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2432 2640 WerFault.exe 32 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 2640 cb64dddceb29c15b7c0b1c346b0c81ed.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe Token: SeDebugPrivilege 2640 cb64dddceb29c15b7c0b1c346b0c81ed.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2588 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 30 PID 2008 wrote to memory of 2588 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 30 PID 2008 wrote to memory of 2588 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 30 PID 2008 wrote to memory of 2588 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 30 PID 2008 wrote to memory of 2604 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 31 PID 2008 wrote to memory of 2604 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 31 PID 2008 wrote to memory of 2604 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 31 PID 2008 wrote to memory of 2604 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 31 PID 2008 wrote to memory of 2640 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 32 PID 2008 wrote to memory of 2640 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 32 PID 2008 wrote to memory of 2640 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 32 PID 2008 wrote to memory of 2640 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 32 PID 2008 wrote to memory of 2640 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 32 PID 2008 wrote to memory of 2640 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 32 PID 2008 wrote to memory of 2640 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 32 PID 2008 wrote to memory of 2640 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 32 PID 2008 wrote to memory of 2640 2008 cb64dddceb29c15b7c0b1c346b0c81ed.exe 32 PID 2640 wrote to memory of 2432 2640 cb64dddceb29c15b7c0b1c346b0c81ed.exe 33 PID 2640 wrote to memory of 2432 2640 cb64dddceb29c15b7c0b1c346b0c81ed.exe 33 PID 2640 wrote to memory of 2432 2640 cb64dddceb29c15b7c0b1c346b0c81ed.exe 33 PID 2640 wrote to memory of 2432 2640 cb64dddceb29c15b7c0b1c346b0c81ed.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb64dddceb29c15b7c0b1c346b0c81ed.exe"C:\Users\Admin\AppData\Local\Temp\cb64dddceb29c15b7c0b1c346b0c81ed.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\cb64dddceb29c15b7c0b1c346b0c81ed.exe"C:\Users\Admin\AppData\Local\Temp\cb64dddceb29c15b7c0b1c346b0c81ed.exe"2⤵PID:2588
-
-
C:\Users\Admin\AppData\Local\Temp\cb64dddceb29c15b7c0b1c346b0c81ed.exe"C:\Users\Admin\AppData\Local\Temp\cb64dddceb29c15b7c0b1c346b0c81ed.exe"2⤵PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\cb64dddceb29c15b7c0b1c346b0c81ed.exe"C:\Users\Admin\AppData\Local\Temp\cb64dddceb29c15b7c0b1c346b0c81ed.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 16203⤵
- Program crash
PID:2432
-
-