General
-
Target
お見積り依頼.zip
-
Size
530KB
-
Sample
241001-fwv2rsscqm
-
MD5
de0714e8f4a00a71452a5b6d8f0db7b8
-
SHA1
8a8e0146138131e210c92b33e61f59ea3f575cfa
-
SHA256
2c56f1f8f12cdf501122a7729d571b2952873f844bb067ea4c59293d9487ae0f
-
SHA512
973e90556106dbf61e6db877e616a91053597d103d2e23759bff51646f86ab83b965dd9d26e0281aa9a1c039a91a4273050a494a7953aa8781990d14806330bb
-
SSDEEP
12288:oMzkHlBdUtyZoLjU5zNePeOTj/iaACe60Y7nmooHh:4PdUYmLjU5zNQbTj/iArcHh
Static task
static1
Behavioral task
behavioral1
Sample
お見積り依頼.exe
Resource
win10-20240404-ja
Behavioral task
behavioral2
Sample
お見積り依頼.exe
Resource
win10v2004-20240910-ja
Malware Config
Targets
-
-
Target
お見積り依頼.exe
-
Size
625KB
-
MD5
a0ecf580ff9dfd9e2a7fa0c3d65f7fd6
-
SHA1
bbe051177c884c85675df9747d86efa1db0f77a4
-
SHA256
c46f4ce81d7501f1beca7fb5c694a7e2883ba4e29c498772c448232f7473aafe
-
SHA512
ef030e4ea6807ec2276e32772a517bca9f88a4891e291d3baf4a5c7dae1739604df173198eccb8583344c6f4d918b7df2f6c298f0be8b5bae4c123e7fdad34fa
-
SSDEEP
12288:oJOkHljdod9R5CHTCIM0Tr/koAyUoQepfHsz:g69R5ObpTr/kAPjO
-
Snake Keylogger payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2