Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 14:03
Static task
static1
Behavioral task
behavioral1
Sample
88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe
Resource
win10v2004-20240412-en
General
-
Target
88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe
-
Size
459KB
-
MD5
8ad01c64b357780c078e44780c322600
-
SHA1
a016f5f6ff8a89557e34b5e5173dfc8a9a50b6ab
-
SHA256
88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365
-
SHA512
e1d0a7c2749b1f06fa22c8f0a3b134f8220b9c4898e8af9d7c1ee33567f07d245f606ddb74e02afa71c7f4076051afb1c99f72f5d47da2efa1ed5534a1de825d
-
SSDEEP
6144:q+hiQ1o1emq43RaLJM5hp8Sp1YX7RdE66hYM30mztCiLAzvmBsOuRLX3+0Wtz6t0:74ZqGhF7uidhYM7COQvmBsOeetyAQF
Malware Config
Extracted
snakekeylogger
https://scratchdreams.tk
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2564-14-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2564-16-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2564-20-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2564-23-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2564-25-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 864 cmd.exe -
Drops startup file 2 IoCs
Processes:
Powershell.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe Powershell.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exedescription pid process target process PID 1256 set thread context of 2564 1256 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exePowershell.exepid process 2564 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe 3036 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exePowershell.exedescription pid process Token: SeDebugPrivilege 2564 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe Token: SeDebugPrivilege 3036 Powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.execmd.exedescription pid process target process PID 1256 wrote to memory of 3036 1256 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe Powershell.exe PID 1256 wrote to memory of 3036 1256 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe Powershell.exe PID 1256 wrote to memory of 3036 1256 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe Powershell.exe PID 1256 wrote to memory of 3036 1256 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe Powershell.exe PID 1256 wrote to memory of 2564 1256 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe PID 1256 wrote to memory of 2564 1256 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe PID 1256 wrote to memory of 2564 1256 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe PID 1256 wrote to memory of 2564 1256 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe PID 1256 wrote to memory of 2564 1256 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe PID 1256 wrote to memory of 2564 1256 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe PID 1256 wrote to memory of 2564 1256 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe PID 1256 wrote to memory of 2564 1256 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe PID 1256 wrote to memory of 2564 1256 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe PID 2564 wrote to memory of 864 2564 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe cmd.exe PID 2564 wrote to memory of 864 2564 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe cmd.exe PID 2564 wrote to memory of 864 2564 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe cmd.exe PID 2564 wrote to memory of 864 2564 88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe cmd.exe PID 864 wrote to memory of 2680 864 cmd.exe choice.exe PID 864 wrote to memory of 2680 864 cmd.exe choice.exe PID 864 wrote to memory of 2680 864 cmd.exe choice.exe PID 864 wrote to memory of 2680 864 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe"C:\Users\Admin\AppData\Local\Temp\88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe"C:\Users\Admin\AppData\Local\Temp\88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\88137ef5ca05130558e846da3d480008f2e5488a7543872195f64daa5a04b365.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵PID:2680
-
-
-