Analysis

  • max time kernel
    120s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-04-2024 10:40

General

  • Target

    FATEYU07655700003.exe

  • Size

    1.1MB

  • MD5

    9258acec51d72838b25d0a48767a6c95

  • SHA1

    3dce5acc74ae4db1c3cdc516f4d680c631b27b65

  • SHA256

    9408b2474a4faee9afbab11fa258873175b9d9400d9c582104fb6400505c5475

  • SHA512

    7b31a5b974cf9c86fbd62b06ebdb5461a85687554a625ea7332c654c188b9e6c0a51a5a1f88af579c96e6ef9be3326c2732afef762f66e7ae45c100ed0e3a279

  • SSDEEP

    24576:/AHnh+eWsN3skA4RV1Hom2KXMmHaA4H4444Cs0K4WgMcCNK4U25:ih+ZkldoPK8YaA4H4444Csgx7CNz

Malware Config

Extracted

Family

snakekeylogger

C2

https://scratchdreams.tk

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 37 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FATEYU07655700003.exe
    "C:\Users\Admin\AppData\Local\Temp\FATEYU07655700003.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Users\Admin\AppData\Local\Glagolitic\unprickled.exe
      "C:\Users\Admin\AppData\Local\Temp\FATEYU07655700003.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Users\Admin\AppData\Local\Temp\FATEYU07655700003.exe"
        3⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Citlaltpetl

    Filesize

    224KB

    MD5

    adb3ecd76748169582d1156a86b189eb

    SHA1

    cfafb70dbe76da2532ae8ded3949b5769b3fa645

    SHA256

    08715b88d879e1e36ade1898298b8867dae95a35556146cd97902f1507f319e8

    SHA512

    ac8c19275fba3b06bd0edcff660fe3c2da3cf0a1232d614bdd8b8d835974b1cf3f506e30d23c46eb737f2474b508306ae3119fb285f0a52dff1399a4cfe8a6a9

  • C:\Users\Admin\AppData\Local\Temp\myriopodous

    Filesize

    29KB

    MD5

    f6e6acf9d7c8e8052493106f98de4b81

    SHA1

    dd97a6076b2e85baeb01e940fd77f89223fa081e

    SHA256

    e4a9c960a06c6202e05e60da8944e3217cbfafe508f8f85851151853043f6a00

    SHA512

    458fd080b3ee5e3cb68bf9360e82aea1b673159e847c3203638c3240b8d875e9c622e64dc09173197e81f3237a3a7a7ec3003618e6112ff19dcbc763f01e2f6a

  • \Users\Admin\AppData\Local\Glagolitic\unprickled.exe

    Filesize

    106.1MB

    MD5

    17fb2e2e49ba238527a391e89eec566b

    SHA1

    e75a5984533090442cf13ff1e8d1447933b49bd9

    SHA256

    cf6715990c24dc8479d89482cf67ac0de3a9c19fcc4260bf868f1a0493736d08

    SHA512

    da2f25e599c3d8c820aef01cedb89b6db4e7ce9920b1ae2062d779e6f1cd9e35143c0b7496e970f33125d312f8e7c1635460e062326e2eac69c1dd6e180769f6

  • memory/2576-62-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-631-0x0000000004C00000-0x0000000004C40000-memory.dmp

    Filesize

    256KB

  • memory/2576-32-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2576-33-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2576-35-0x0000000004C00000-0x0000000004C40000-memory.dmp

    Filesize

    256KB

  • memory/2576-34-0x00000000743D0000-0x0000000074ABE000-memory.dmp

    Filesize

    6.9MB

  • memory/2576-36-0x0000000000370000-0x00000000003AA000-memory.dmp

    Filesize

    232KB

  • memory/2576-37-0x0000000004C00000-0x0000000004C40000-memory.dmp

    Filesize

    256KB

  • memory/2576-38-0x00000000003C0000-0x00000000003F8000-memory.dmp

    Filesize

    224KB

  • memory/2576-39-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-40-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-44-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-42-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-46-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-50-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-48-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-66-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-56-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-54-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-60-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-58-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-632-0x0000000004C00000-0x0000000004C40000-memory.dmp

    Filesize

    256KB

  • memory/2576-68-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-30-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2576-52-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-72-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-70-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-74-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-76-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-78-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-82-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-84-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-80-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-88-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-86-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-90-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-94-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-96-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-92-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-98-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2576-627-0x0000000004C00000-0x0000000004C40000-memory.dmp

    Filesize

    256KB

  • memory/2576-628-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2576-629-0x00000000743D0000-0x0000000074ABE000-memory.dmp

    Filesize

    6.9MB

  • memory/2576-630-0x0000000004C00000-0x0000000004C40000-memory.dmp

    Filesize

    256KB

  • memory/2576-64-0x00000000003C0000-0x00000000003F3000-memory.dmp

    Filesize

    204KB

  • memory/2908-10-0x0000000000120000-0x0000000000124000-memory.dmp

    Filesize

    16KB