Analysis
-
max time kernel
94s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 17:55
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATIONSEPQTRA071244PDF.scr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
QUOTATIONSEPQTRA071244PDF.scr.exe
Resource
win10v2004-20240802-en
General
-
Target
QUOTATIONSEPQTRA071244PDF.scr.exe
-
Size
497KB
-
MD5
60fdae7957c24a52dcb84aa1802edbd4
-
SHA1
4f38d0c6f43e8d6efaa6d4355d563213b0cf6866
-
SHA256
6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676
-
SHA512
9367458d72ba32b3e0542c94afc0ea6f3cf5c5fcbb17f45cac917ea1f35225292de9185a8b5df60e6bb43047c4546c638489addc41db4f052094224b053057fc
-
SSDEEP
1536:CH8HxsM08Tcgc92csCGlTyzUuZ0SVPRiNaQnFYUHKa/GUkgGPYSLgVay+Zm1SMhf:PZGmtFfqgOYSLgf+ZmRvV5FPV
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
Zg^!Zy[?IKrs99@soltan
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/4816-1094-0x00000292E9E40000-0x00000292E9E64000-memory.dmp family_snakekeylogger -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3488 created 3476 3488 QUOTATIONSEPQTRA071244PDF.scr.exe 56 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe Key opened \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe Key opened \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 42 checkip.dyndns.org -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3488 QUOTATIONSEPQTRA071244PDF.scr.exe 4816 aspnet_compiler.exe 4816 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3488 QUOTATIONSEPQTRA071244PDF.scr.exe Token: SeDebugPrivilege 3488 QUOTATIONSEPQTRA071244PDF.scr.exe Token: SeDebugPrivilege 4816 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3488 wrote to memory of 4816 3488 QUOTATIONSEPQTRA071244PDF.scr.exe 91 PID 3488 wrote to memory of 4816 3488 QUOTATIONSEPQTRA071244PDF.scr.exe 91 PID 3488 wrote to memory of 4816 3488 QUOTATIONSEPQTRA071244PDF.scr.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 aspnet_compiler.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\QUOTATIONSEPQTRA071244PDF.scr.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATIONSEPQTRA071244PDF.scr.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3488
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4816
-