Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2024 21:10

General

  • Target

    e01a751a8d6a089d25eccf34c504a5b0.exe

  • Size

    644KB

  • MD5

    e01a751a8d6a089d25eccf34c504a5b0

  • SHA1

    58198c6cfa650df0609cb1dd931a59ebe6388d0f

  • SHA256

    524bd24b076dc2580ced18f98ee98ab54d528f5fc8ffe02bdda47fa557feeb3c

  • SHA512

    c83b57f3ae4340f74888a18a7d557157ae339934004febe871fe3df8c7245884b4038957a0487b3d85f52926b8f132284e0052e5017849c49c3103876267c7e0

  • SSDEEP

    12288:z1/p+gczyhNSvRbBQHR4qz91hI0zSaNsvz+yuWDVId21NaI+E8tyvX6sJD37USqY:TsJDLjqb5cIX5zpwg0srHFD

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e01a751a8d6a089d25eccf34c504a5b0.exe
    "C:\Users\Admin\AppData\Local\Temp\e01a751a8d6a089d25eccf34c504a5b0.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\AppData\Local\Temp\e01a751a8d6a089d25eccf34c504a5b0.exe
      "{path}"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:8
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 776
        3⤵
        • Drops file in Windows directory
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:4616

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

6
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\e01a751a8d6a089d25eccf34c504a5b0.exe.log
    Filesize

    588B

    MD5

    ce018db9ef68d46f5883a7af40373ba3

    SHA1

    96e2972da16e1f3d7859a9c420636fb5658b17dc

    SHA256

    5200ac161fc575d5a47cf1b072bd1d6e9d9fc16857fd6372e58a5a09cc716069

    SHA512

    379c1e3cbdc51b9fbd40082c88dc48eee8dbcbb3cdc2b2f6448c1ded0f8f01957e6c07ec13134daef842d787e60298d32f7520bff3f795b208887e5a1486c936

  • memory/8-4-0x0000000000400000-0x0000000000424000-memory.dmp
    Filesize

    144KB

  • memory/8-8-0x0000000075540000-0x0000000075AF1000-memory.dmp
    Filesize

    5.7MB

  • memory/8-9-0x0000000001580000-0x0000000001590000-memory.dmp
    Filesize

    64KB

  • memory/8-10-0x0000000075540000-0x0000000075AF1000-memory.dmp
    Filesize

    5.7MB

  • memory/8-17-0x0000000075540000-0x0000000075AF1000-memory.dmp
    Filesize

    5.7MB

  • memory/1808-0-0x0000000075540000-0x0000000075AF1000-memory.dmp
    Filesize

    5.7MB

  • memory/1808-1-0x00000000015E0000-0x00000000015F0000-memory.dmp
    Filesize

    64KB

  • memory/1808-2-0x0000000075540000-0x0000000075AF1000-memory.dmp
    Filesize

    5.7MB

  • memory/1808-3-0x0000000075540000-0x0000000075AF1000-memory.dmp
    Filesize

    5.7MB

  • memory/1808-7-0x0000000075540000-0x0000000075AF1000-memory.dmp
    Filesize

    5.7MB