Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
liquidação de fatura de pagamento.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
liquidação de fatura de pagamento.exe
Resource
win10v2004-20241007-en
General
-
Target
liquidação de fatura de pagamento.exe
-
Size
2.3MB
-
MD5
383574fcb2a1b030666cb7c3be603445
-
SHA1
2fcf52b141d329798d4d9c6fc1c2b3326a8ccdc9
-
SHA256
b0a9e6a7deccda1f29e48f243f15e225f59e9fe11e7ce25f9433e3f8d233ad6c
-
SHA512
92f6bbb31d94f72e3fdf1396270563647f22f853828658ab9843616cb2d534ce2b3081df87bb2129bee267cfa83f8aaa7dfaf447a8d104a6c89ef049a4562e8a
-
SSDEEP
24576:XNw5wQb8vxzKM8LKbaxrNzlEUBFs6JYH2oDXPtJv55njhYzuyKpraS7FFX:XNQbNEaxrNzl5FYJLtpxwuyuF
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
webmail.setarehatlaspars.com - Port:
587 - Username:
[email protected] - Password:
Set@reh1398 - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/3304-1093-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2288 created 3440 2288 liquidação de fatura de pagamento.exe 56 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Koerxmxvkh = "C:\\Users\\Admin\\AppData\\Roaming\\Koerxmxvkh.exe" liquidação de fatura de pagamento.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2288 set thread context of 3304 2288 liquidação de fatura de pagamento.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language liquidação de fatura de pagamento.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2288 liquidação de fatura de pagamento.exe 3304 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2288 liquidação de fatura de pagamento.exe Token: SeDebugPrivilege 2288 liquidação de fatura de pagamento.exe Token: SeDebugPrivilege 3304 InstallUtil.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2288 wrote to memory of 3304 2288 liquidação de fatura de pagamento.exe 86 PID 2288 wrote to memory of 3304 2288 liquidação de fatura de pagamento.exe 86 PID 2288 wrote to memory of 3304 2288 liquidação de fatura de pagamento.exe 86 PID 2288 wrote to memory of 3304 2288 liquidação de fatura de pagamento.exe 86 PID 2288 wrote to memory of 3304 2288 liquidação de fatura de pagamento.exe 86 PID 2288 wrote to memory of 3304 2288 liquidação de fatura de pagamento.exe 86 PID 2288 wrote to memory of 3304 2288 liquidação de fatura de pagamento.exe 86 PID 2288 wrote to memory of 3304 2288 liquidação de fatura de pagamento.exe 86 PID 3304 wrote to memory of 3808 3304 InstallUtil.exe 88 PID 3304 wrote to memory of 3808 3304 InstallUtil.exe 88 PID 3304 wrote to memory of 3808 3304 InstallUtil.exe 88 PID 3808 wrote to memory of 1848 3808 cmd.exe 90 PID 3808 wrote to memory of 1848 3808 cmd.exe 90 PID 3808 wrote to memory of 1848 3808 cmd.exe 90
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\liquidação de fatura de pagamento.exe"C:\Users\Admin\AppData\Local\Temp\liquidação de fatura de pagamento.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵
- System Location Discovery: System Language Discovery
PID:1848
-
-
-