Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-07-2024 14:26

General

  • Target

    1e2e668213a67dba5e1a30cd974a8a80a9623137fd1abdbf8a18770f25ad1172_dump.exe

  • Size

    130KB

  • MD5

    1e6b4ea7b47a013581faf6618a371a07

  • SHA1

    1c92c7d8a38e0fa5bfd852fee7b196def1e6341d

  • SHA256

    468dcc14bf6cafae37933064c9263ceeb85f2500e8c3d8889a7121c408604cdd

  • SHA512

    a016b8207910aa919651a2f737a5e50a1c2bfc29006eb07debe8a9fa82bf1c409bbe95c03969e579fd48570fcef047fb50267bb596a5727633ad842f0e391a67

  • SSDEEP

    3072:YCDqZtIG+1m87Qc04NsiNQbtS+wjosLYwvxUSHDbY:+ZtIR1m8fQbQ+4ASjb

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e2e668213a67dba5e1a30cd974a8a80a9623137fd1abdbf8a18770f25ad1172_dump.exe
    "C:\Users\Admin\AppData\Local\Temp\1e2e668213a67dba5e1a30cd974a8a80a9623137fd1abdbf8a18770f25ad1172_dump.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • outlook_office_path
    • outlook_win_path
    PID:4620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4620-1-0x0000000000A50000-0x0000000000A74000-memory.dmp

    Filesize

    144KB

  • memory/4620-0-0x00007FFFA32B3000-0x00007FFFA32B5000-memory.dmp

    Filesize

    8KB

  • memory/4620-2-0x00007FFFA32B0000-0x00007FFFA3D71000-memory.dmp

    Filesize

    10.8MB

  • memory/4620-3-0x000000001EB70000-0x000000001EBC0000-memory.dmp

    Filesize

    320KB

  • memory/4620-4-0x000000001ED90000-0x000000001EF52000-memory.dmp

    Filesize

    1.8MB

  • memory/4620-5-0x00007FFFA32B3000-0x00007FFFA32B5000-memory.dmp

    Filesize

    8KB

  • memory/4620-6-0x00007FFFA32B0000-0x00007FFFA3D71000-memory.dmp

    Filesize

    10.8MB