Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 15:57
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SOA.exe
Resource
win10v2004-20240802-en
General
-
Target
SOA.exe
-
Size
645KB
-
MD5
b0be16b78d21ae5c42c8309fcb54cdaa
-
SHA1
5777abdce97d2d3382bec264a1f2ebd9c9623e39
-
SHA256
ac77fcbe1456c6fbc62e66bece175cc00a33eaab4353830c7fcf25116891ceac
-
SHA512
4db8ad2d31d2cbb5d32a22376e4571483161ea861d3babcc501857c9b70fcb9fc78f1af70e44ffc2efd9af495ec411125494a61487f8f562e59f02330b82214e
-
SSDEEP
12288:LXk1tn7HeIlPNodfFP6GefzDK9TrcfQfHBWLb9yV55hTVbBb:Lo7Z1odfFP6tWVtf
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1696248561:AAELXu6APanbtx1va3V24yWuQqYB4lDCkBI/sendMessage?chat_id=1594516081
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation SOA.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3144 set thread context of 2124 3144 SOA.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3948 2124 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SOA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2588 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3144 SOA.exe 3144 SOA.exe 3144 SOA.exe 2124 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3144 SOA.exe Token: SeDebugPrivilege 2124 RegSvcs.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3144 wrote to memory of 2588 3144 SOA.exe 97 PID 3144 wrote to memory of 2588 3144 SOA.exe 97 PID 3144 wrote to memory of 2588 3144 SOA.exe 97 PID 3144 wrote to memory of 4312 3144 SOA.exe 99 PID 3144 wrote to memory of 4312 3144 SOA.exe 99 PID 3144 wrote to memory of 4312 3144 SOA.exe 99 PID 3144 wrote to memory of 2124 3144 SOA.exe 100 PID 3144 wrote to memory of 2124 3144 SOA.exe 100 PID 3144 wrote to memory of 2124 3144 SOA.exe 100 PID 3144 wrote to memory of 2124 3144 SOA.exe 100 PID 3144 wrote to memory of 2124 3144 SOA.exe 100 PID 3144 wrote to memory of 2124 3144 SOA.exe 100 PID 3144 wrote to memory of 2124 3144 SOA.exe 100 PID 3144 wrote to memory of 2124 3144 SOA.exe 100 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA.exe"C:\Users\Admin\AppData\Local\Temp\SOA.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KYNIulu" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1836.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2588
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵PID:4312
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 14243⤵
- Program crash
PID:3948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 2124 -ip 21241⤵PID:4052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dc59ff2ca60b712b55698b09e1dc62d9
SHA1894aa2f4f9a7ae4836abf1abc3c12e1ee587c1a1
SHA2561af07cac29769ff9879019508da5024668342bab17181a943dd94489903e2af1
SHA51279900ed574b30ff7691dae25b7d2764ad45f3e81518522f8b26917ced817994c60c959fc714a8d6b9b8a835fe30cc3a6dff4adaccf1b00816ecd04a4a4fe7d7f