Analysis

  • max time kernel
    94s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2024 14:03

General

  • Target

    QUOTATION_SEPQTRA071244úPDF.scr.exe

  • Size

    497KB

  • MD5

    60fdae7957c24a52dcb84aa1802edbd4

  • SHA1

    4f38d0c6f43e8d6efaa6d4355d563213b0cf6866

  • SHA256

    6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676

  • SHA512

    9367458d72ba32b3e0542c94afc0ea6f3cf5c5fcbb17f45cac917ea1f35225292de9185a8b5df60e6bb43047c4546c638489addc41db4f052094224b053057fc

  • SSDEEP

    1536:CH8HxsM08Tcgc92csCGlTyzUuZ0SVPRiNaQnFYUHKa/GUkgGPYSLgVay+Zm1SMhf:PZGmtFfqgOYSLgf+ZmRvV5FPV

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Zg^!Zy[?IKrs99@soltan

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3568
      • C:\Users\Admin\AppData\Local\Temp\QUOTATION_SEPQTRA071244úPDF.scr.exe
        "C:\Users\Admin\AppData\Local\Temp\QUOTATION_SEPQTRA071244úPDF.scr.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2232
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:3680

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2232-0-0x00007FF9B30D3000-0x00007FF9B30D5000-memory.dmp

      Filesize

      8KB

    • memory/2232-1-0x0000022BEDAD0000-0x0000022BEDB50000-memory.dmp

      Filesize

      512KB

    • memory/2232-2-0x00007FF9B30D0000-0x00007FF9B3B91000-memory.dmp

      Filesize

      10.8MB

    • memory/2232-3-0x0000022BF0470000-0x0000022BF0570000-memory.dmp

      Filesize

      1024KB

    • memory/2232-21-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-23-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-65-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-67-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-63-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-59-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-57-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-55-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-51-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-49-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-47-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-45-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-61-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-43-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-53-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-41-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-39-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-37-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-33-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-31-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-29-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-27-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-25-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-19-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-17-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-15-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-13-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-11-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-9-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-7-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-5-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-35-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-4-0x0000022BF0470000-0x0000022BF056B000-memory.dmp

      Filesize

      1004KB

    • memory/2232-1078-0x00007FF9B30D0000-0x00007FF9B3B91000-memory.dmp

      Filesize

      10.8MB

    • memory/2232-1080-0x0000022BEF700000-0x0000022BEF74C000-memory.dmp

      Filesize

      304KB

    • memory/2232-1079-0x0000022BF0570000-0x0000022BF05EC000-memory.dmp

      Filesize

      496KB

    • memory/2232-1084-0x00007FF9B30D0000-0x00007FF9B3B91000-memory.dmp

      Filesize

      10.8MB

    • memory/2232-1085-0x00007FF9B30D0000-0x00007FF9B3B91000-memory.dmp

      Filesize

      10.8MB

    • memory/2232-1086-0x00007FF9B30D0000-0x00007FF9B3B91000-memory.dmp

      Filesize

      10.8MB

    • memory/2232-1087-0x00007FF9B30D3000-0x00007FF9B30D5000-memory.dmp

      Filesize

      8KB

    • memory/2232-1088-0x0000022BF16A0000-0x0000022BF16F4000-memory.dmp

      Filesize

      336KB

    • memory/2232-1090-0x00007FF9B30D0000-0x00007FF9B3B91000-memory.dmp

      Filesize

      10.8MB

    • memory/3680-1091-0x00000219643A0000-0x00000219643C8000-memory.dmp

      Filesize

      160KB

    • memory/3680-1092-0x00007FF9B30D3000-0x00007FF9B30D5000-memory.dmp

      Filesize

      8KB

    • memory/3680-1093-0x0000021965EF0000-0x0000021965F14000-memory.dmp

      Filesize

      144KB

    • memory/3680-1094-0x00007FF9B30D0000-0x00007FF9B3B91000-memory.dmp

      Filesize

      10.8MB

    • memory/3680-1095-0x00007FF9B30D0000-0x00007FF9B3B91000-memory.dmp

      Filesize

      10.8MB

    • memory/3680-1096-0x00007FF9B30D0000-0x00007FF9B3B91000-memory.dmp

      Filesize

      10.8MB

    • memory/3680-1097-0x000002197FAD0000-0x000002197FB20000-memory.dmp

      Filesize

      320KB

    • memory/3680-1098-0x000002197FCF0000-0x000002197FEB2000-memory.dmp

      Filesize

      1.8MB

    • memory/3680-1099-0x00007FF9B30D3000-0x00007FF9B30D5000-memory.dmp

      Filesize

      8KB

    • memory/3680-1100-0x00007FF9B30D0000-0x00007FF9B3B91000-memory.dmp

      Filesize

      10.8MB