Analysis
-
max time kernel
135s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 06:41
Static task
static1
Behavioral task
behavioral1
Sample
Quality stuff.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Quality stuff.pdf.exe
Resource
win10v2004-20241007-en
General
-
Target
Quality stuff.pdf.exe
-
Size
53KB
-
MD5
d8fb463ad208075d7f2dbf2fcf741552
-
SHA1
01f65045c6f7d541b8a97e94687b1d9c3966432b
-
SHA256
252cafe1ccfc66dc1ec8d88f7fbe036899cc865d6a98196598bf0a3314b56ea8
-
SHA512
3e5a330b1cb73f9ecf1c09785d2c215c7987ceec101053ea346e1a909188e226843e043d960d1a0882aa8a7d4967d82a1686738a16664a59baa58d2154254bf0
-
SSDEEP
768:UO4D+pP8PIUXCWdTKzX6C8C6aErKyrOkixgi2RaQQ6pL6hHvYe7dCplfn1VRjUd+:zpUlrCC0Qt1njUdD3ZT0i2hgU6A
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot8069816150:AAGUqkcMn6u9wnhjGwn59_cFD18VE7JaJgI/sendMessage?chat_id=7215551272
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/3236-1097-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1892 created 3460 1892 Quality stuff.pdf.exe 56 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Culture.vbs Quality stuff.pdf.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1892 set thread context of 3236 1892 Quality stuff.pdf.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quality stuff.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1892 Quality stuff.pdf.exe 3236 InstallUtil.exe 3236 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1892 Quality stuff.pdf.exe Token: SeDebugPrivilege 1892 Quality stuff.pdf.exe Token: SeDebugPrivilege 3236 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1892 wrote to memory of 3236 1892 Quality stuff.pdf.exe 98 PID 1892 wrote to memory of 3236 1892 Quality stuff.pdf.exe 98 PID 1892 wrote to memory of 3236 1892 Quality stuff.pdf.exe 98 PID 1892 wrote to memory of 3236 1892 Quality stuff.pdf.exe 98 PID 1892 wrote to memory of 3236 1892 Quality stuff.pdf.exe 98 PID 1892 wrote to memory of 3236 1892 Quality stuff.pdf.exe 98 PID 1892 wrote to memory of 3236 1892 Quality stuff.pdf.exe 98 PID 1892 wrote to memory of 3236 1892 Quality stuff.pdf.exe 98 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\Quality stuff.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Quality stuff.pdf.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1892
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3236
-