Analysis

  • max time kernel
    125s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-04-2024 23:36

General

  • Target

    9408b2474a4faee9afbab11fa258873175b9d9400d9c582104fb6400505c5475.exe

  • Size

    1.1MB

  • MD5

    9258acec51d72838b25d0a48767a6c95

  • SHA1

    3dce5acc74ae4db1c3cdc516f4d680c631b27b65

  • SHA256

    9408b2474a4faee9afbab11fa258873175b9d9400d9c582104fb6400505c5475

  • SHA512

    7b31a5b974cf9c86fbd62b06ebdb5461a85687554a625ea7332c654c188b9e6c0a51a5a1f88af579c96e6ef9be3326c2732afef762f66e7ae45c100ed0e3a279

  • SSDEEP

    24576:/AHnh+eWsN3skA4RV1Hom2KXMmHaA4H4444Cs0K4WgMcCNK4U25:ih+ZkldoPK8YaA4H4444Csgx7CNz

Malware Config

Extracted

Family

snakekeylogger

C2

https://scratchdreams.tk

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 34 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 34 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 34 IoCs
  • Detects executables with potential process hoocking 34 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9408b2474a4faee9afbab11fa258873175b9d9400d9c582104fb6400505c5475.exe
    "C:\Users\Admin\AppData\Local\Temp\9408b2474a4faee9afbab11fa258873175b9d9400d9c582104fb6400505c5475.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Users\Admin\AppData\Local\Glagolitic\unprickled.exe
      "C:\Users\Admin\AppData\Local\Temp\9408b2474a4faee9afbab11fa258873175b9d9400d9c582104fb6400505c5475.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Users\Admin\AppData\Local\Temp\9408b2474a4faee9afbab11fa258873175b9d9400d9c582104fb6400505c5475.exe"
        3⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2432

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Citlaltpetl
    Filesize

    224KB

    MD5

    adb3ecd76748169582d1156a86b189eb

    SHA1

    cfafb70dbe76da2532ae8ded3949b5769b3fa645

    SHA256

    08715b88d879e1e36ade1898298b8867dae95a35556146cd97902f1507f319e8

    SHA512

    ac8c19275fba3b06bd0edcff660fe3c2da3cf0a1232d614bdd8b8d835974b1cf3f506e30d23c46eb737f2474b508306ae3119fb285f0a52dff1399a4cfe8a6a9

  • C:\Users\Admin\AppData\Local\Temp\myriopodous
    Filesize

    29KB

    MD5

    f6e6acf9d7c8e8052493106f98de4b81

    SHA1

    dd97a6076b2e85baeb01e940fd77f89223fa081e

    SHA256

    e4a9c960a06c6202e05e60da8944e3217cbfafe508f8f85851151853043f6a00

    SHA512

    458fd080b3ee5e3cb68bf9360e82aea1b673159e847c3203638c3240b8d875e9c622e64dc09173197e81f3237a3a7a7ec3003618e6112ff19dcbc763f01e2f6a

  • \Users\Admin\AppData\Local\Glagolitic\unprickled.exe
    Filesize

    107.1MB

    MD5

    5be66b33aedd330eebbf67dc9014a456

    SHA1

    e036115671f712cd5949816191ea784c6733a56f

    SHA256

    6586e71f836227eef5e9a7ed3b769c94db89f2cc740b9fc624baf1a191466093

    SHA512

    f7b0e498c627dd5f066aa180a46ae1be12e68e52a958e886cd0dc9b29c48677cb7108ffb5eaedfeb4068bb2ea903a7334fe0dd15c698452ed05d97fdf2c69a89

  • memory/2432-83-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-33-0x0000000000400000-0x000000000043D000-memory.dmp
    Filesize

    244KB

  • memory/2432-32-0x0000000000400000-0x000000000043D000-memory.dmp
    Filesize

    244KB

  • memory/2432-91-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-34-0x0000000001EC0000-0x0000000001EFA000-memory.dmp
    Filesize

    232KB

  • memory/2432-35-0x0000000074930000-0x000000007501E000-memory.dmp
    Filesize

    6.9MB

  • memory/2432-36-0x0000000001F50000-0x0000000001F90000-memory.dmp
    Filesize

    256KB

  • memory/2432-37-0x0000000001FD0000-0x0000000002008000-memory.dmp
    Filesize

    224KB

  • memory/2432-39-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-41-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-45-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-49-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-51-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-55-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-59-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-95-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-69-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-75-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-79-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-629-0x0000000001F50000-0x0000000001F90000-memory.dmp
    Filesize

    256KB

  • memory/2432-628-0x0000000074930000-0x000000007501E000-memory.dmp
    Filesize

    6.9MB

  • memory/2432-30-0x0000000000400000-0x000000000043D000-memory.dmp
    Filesize

    244KB

  • memory/2432-65-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-97-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-93-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-89-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-85-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-81-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-77-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-73-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-71-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-67-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-63-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-61-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-57-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-53-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-47-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-43-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-38-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2432-626-0x0000000001F50000-0x0000000001F90000-memory.dmp
    Filesize

    256KB

  • memory/2432-627-0x0000000000400000-0x000000000043D000-memory.dmp
    Filesize

    244KB

  • memory/2432-87-0x0000000001FD0000-0x0000000002003000-memory.dmp
    Filesize

    204KB

  • memory/2552-10-0x0000000000770000-0x0000000000774000-memory.dmp
    Filesize

    16KB