Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 01:05
Static task
static1
Behavioral task
behavioral1
Sample
Specification details.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Specification details.exe
Resource
win10v2004-20240508-en
General
-
Target
Specification details.exe
-
Size
491KB
-
MD5
9b2e3e7a82517cce2cbcc58fef4b8457
-
SHA1
7764b9aebaa7c3a0c1b3bae37955d5b52450178a
-
SHA256
648c777abbc03f6b816a0f8a794c91b69fb1f66da5fdfc7ce93cf5e5efde1b82
-
SHA512
5de712d3f2e7de1db38bb3fd44ea892d5543af25ea8dcc39d6fc22893c0cb127bc3e9d8812b99d26bb4847cb77e0c1f7766389f2bf05900ae3e30690434ecdae
-
SSDEEP
12288:ttMyF3ltmhmcOVahfG3+CSQ9vkk93YmjWWsGf:XM6ltmhja+CSQCk932Wsq
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
valleycountysar.org - Port:
26 - Username:
[email protected] - Password:
fY,FLoadtsiF
http://103.130.147.85
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/4280-9-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
resource yara_rule behavioral2/memory/4280-9-0x0000000000400000-0x0000000000426000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
resource yara_rule behavioral2/memory/4280-9-0x0000000000400000-0x0000000000426000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients -
Detects executables with potential process hoocking 1 IoCs
resource yara_rule behavioral2/memory/4280-9-0x0000000000400000-0x0000000000426000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DotNetProcHook -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1400 set thread context of 4280 1400 Specification details.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 2136 4280 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4280 Specification details.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4280 Specification details.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1400 wrote to memory of 4280 1400 Specification details.exe 83 PID 1400 wrote to memory of 4280 1400 Specification details.exe 83 PID 1400 wrote to memory of 4280 1400 Specification details.exe 83 PID 1400 wrote to memory of 4280 1400 Specification details.exe 83 PID 1400 wrote to memory of 4280 1400 Specification details.exe 83 PID 1400 wrote to memory of 4280 1400 Specification details.exe 83 PID 1400 wrote to memory of 4280 1400 Specification details.exe 83 PID 1400 wrote to memory of 4280 1400 Specification details.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Specification details.exe"C:\Users\Admin\AppData\Local\Temp\Specification details.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\Specification details.exe"C:\Users\Admin\AppData\Local\Temp\Specification details.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 14523⤵
- Program crash
PID:2136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4280 -ip 42801⤵PID:2368