Analysis
-
max time kernel
119s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe
Resource
win10v2004-20240412-en
General
-
Target
9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe
-
Size
464KB
-
MD5
33b3a84329888a084a88712bbf7243a0
-
SHA1
8f74801de3966b0fccd22164a53e92574cce26e7
-
SHA256
9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e
-
SHA512
929e28985a7e9053fae9bb71b8e7e70599765d1111b1fe0ba5574862081f38c214ff125e8dec49ac2082891343f89a0f93af603c01d9f3a6b3f0a1326ccf6229
-
SSDEEP
6144:rvCIIwryDMr/hTYf3yPxAUy8HqN4DH3fA09878ktKMMsbiGx3XnUzG9ZfhRwm:rCXn4wGxJyLw3f587rMsln3f
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
instalacionestasende.com - Port:
25 - Username:
[email protected] - Password:
VzX79@6v - Email To:
[email protected]
https://scratchdreams.tk
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/2168-9-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2168-11-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2168-15-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2168-18-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2168-20-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2168-22-0x0000000004B80000-0x0000000004BC0000-memory.dmp family_snakekeylogger behavioral1/memory/2168-38-0x0000000004B80000-0x0000000004BC0000-memory.dmp family_snakekeylogger -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2504 cmd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exedescription pid process target process PID 888 set thread context of 2168 888 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exepid process 2168 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exedescription pid process Token: SeDebugPrivilege 2168 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.execmd.exedescription pid process target process PID 888 wrote to memory of 2168 888 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe PID 888 wrote to memory of 2168 888 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe PID 888 wrote to memory of 2168 888 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe PID 888 wrote to memory of 2168 888 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe PID 888 wrote to memory of 2168 888 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe PID 888 wrote to memory of 2168 888 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe PID 888 wrote to memory of 2168 888 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe PID 888 wrote to memory of 2168 888 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe PID 888 wrote to memory of 2168 888 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe PID 2168 wrote to memory of 2504 2168 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe cmd.exe PID 2168 wrote to memory of 2504 2168 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe cmd.exe PID 2168 wrote to memory of 2504 2168 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe cmd.exe PID 2168 wrote to memory of 2504 2168 9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe cmd.exe PID 2504 wrote to memory of 1696 2504 cmd.exe choice.exe PID 2504 wrote to memory of 1696 2504 cmd.exe choice.exe PID 2504 wrote to memory of 1696 2504 cmd.exe choice.exe PID 2504 wrote to memory of 1696 2504 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe"C:\Users\Admin\AppData\Local\Temp\9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Local\Temp\9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe"C:\Users\Admin\AppData\Local\Temp\9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\9b59cf1e6991964af85280afc3c850b3e42164e2ad12a460ed80695242be568e.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵PID:1696
-
-
-