Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 13:19
Behavioral task
behavioral1
Sample
461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exe
Resource
win10v2004-20240226-en
General
-
Target
461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exe
-
Size
129KB
-
MD5
ccfdbf07643aed4c333fad91828e4a80
-
SHA1
ccb1efa6c2ef21eb912bfdabb9a6bccb374dc248
-
SHA256
461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e
-
SHA512
c9bd1a9ac30e941eae5acf39cff6c6b0ac8a95e7bd0c656496851f15fcce345f4cf0371df6aad709c4f72845ad496291a70d9364572abdd8da0d7444f385b6c7
-
SSDEEP
3072:jeHgpwPUTi/GIRhvudmxG9OCAXGtsddlQbgkVcsQvwvxLob3mDbY:VpmNZMm7Lqbfcb30b
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.stpgig.com - Port:
587 - Username:
[email protected] - Password:
Stpgig#Login21
https://scratchdreams.tk
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1692-0-0x000000013F120000-0x000000013F144000-memory.dmp family_snakekeylogger -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2740 cmd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 checkip.dyndns.org -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exepid process 1692 461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exedescription pid process Token: SeDebugPrivilege 1692 461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.execmd.exedescription pid process target process PID 1692 wrote to memory of 2740 1692 461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exe cmd.exe PID 1692 wrote to memory of 2740 1692 461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exe cmd.exe PID 1692 wrote to memory of 2740 1692 461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exe cmd.exe PID 2740 wrote to memory of 2700 2740 cmd.exe choice.exe PID 2740 wrote to memory of 2700 2740 cmd.exe choice.exe PID 2740 wrote to memory of 2700 2740 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exe"C:\Users\Admin\AppData\Local\Temp\461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\461bcd6658a32970b9bd12d978229b8d3c8c1f4bdf00688db287b2b7ce6c880e.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:2700
-
-