Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2024 02:16
Static task
static1
Behavioral task
behavioral1
Sample
QTE070624.scr
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
QTE070624.scr
Resource
win10v2004-20240802-en
General
-
Target
QTE070624.scr
-
Size
63KB
-
MD5
8e63d622b3d98045059d3ef8f59801ff
-
SHA1
dc81dc1a0b0e0976c74e21a1ba14a2026dec9149
-
SHA256
d8d9cbe722dfe8c0b15c418a13e8dd624935466783ecb271d2ed5a747abd30fe
-
SHA512
6f66d4369e940d89d34b25e4292698df8e7e4857bb0fa723636f5f5092b144bf1a0340c5a7b731794a599c814360f0896508235add90f3c068c7aff52e612dbd
-
SSDEEP
768:NcIzUujKOmIpfafTD4r22P8AdEEA/eDAxFVJiC9KGAZMn8clZZ+QE6J:rvjK5iyA22P8AuEAGCVJiC8GAaZbE6J
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7662274889:AAGmLpUAq41adIZH12LVtlSBknhfnx9iQ2g/sendMessage?chat_id=2052461776
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/4052-1095-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4104 created 3492 4104 QTE070624.scr 56 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe Key opened \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4104 set thread context of 4052 4104 QTE070624.scr 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QTE070624.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4104 QTE070624.scr 4052 MSBuild.exe 4052 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4104 QTE070624.scr Token: SeDebugPrivilege 4104 QTE070624.scr Token: SeDebugPrivilege 4052 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4104 wrote to memory of 4052 4104 QTE070624.scr 89 PID 4104 wrote to memory of 4052 4104 QTE070624.scr 89 PID 4104 wrote to memory of 4052 4104 QTE070624.scr 89 PID 4104 wrote to memory of 4052 4104 QTE070624.scr 89 PID 4104 wrote to memory of 4052 4104 QTE070624.scr 89 PID 4104 wrote to memory of 4052 4104 QTE070624.scr 89 PID 4104 wrote to memory of 4052 4104 QTE070624.scr 89 PID 4104 wrote to memory of 4052 4104 QTE070624.scr 89 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 MSBuild.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\QTE070624.scr"C:\Users\Admin\AppData\Local\Temp\QTE070624.scr" /S2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4104
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4052
-