Analysis

  • max time kernel
    71s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    08-11-2024 11:17

General

  • Target

    QUOTATION_NOVQTRA071244úPDF.scr

  • Size

    420KB

  • MD5

    7d50e08c368eaf91f6cd1c8969761108

  • SHA1

    50856851fa5d4f281e93c198897f703eb750b355

  • SHA256

    7ee5e24fa0d20eefa1a946a96a39548ff24ef9ae19745d740b542a5ca21d85fd

  • SHA512

    08efa2e487e742768028b548b6b79193cb60b965ad4bc93a6a1a1efe4a0f0cf92154302602eae029b84a8b0517bd7c2b229cdd94e0e5cfb13eccb1d2298adf46

  • SSDEEP

    3072:ZReD62h/yxtsdklfxG2aN6mvVgBRJhZCkaB4lXlrtB6tyYuyE:ZsD62h/yxmdke2E6mNgbJhZHVtB6E

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    G!!HFpD@N*]*nF

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\QUOTATION_NOVQTRA071244úPDF.scr
    "C:\Users\Admin\AppData\Local\Temp\QUOTATION_NOVQTRA071244úPDF.scr" /S
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2196-1090-0x0000000000060000-0x0000000000088000-memory.dmp

    Filesize

    160KB

  • memory/2196-1092-0x000007FEF5F03000-0x000007FEF5F04000-memory.dmp

    Filesize

    4KB

  • memory/2196-1093-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2196-1094-0x00000000009D0000-0x00000000009F4000-memory.dmp

    Filesize

    144KB

  • memory/2196-1095-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2196-1098-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2196-1097-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2196-1096-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2304-18-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-46-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-5-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-6-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-26-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-8-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-14-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-16-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-22-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-44-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-42-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-41-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-38-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-36-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-34-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-32-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-30-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-28-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-24-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-20-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-3-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2304-12-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-11-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-48-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-56-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-4-0x000000001C430000-0x000000001C538000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-52-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-54-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-68-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-66-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-64-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-62-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-60-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-58-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-50-0x000000001C430000-0x000000001C532000-memory.dmp

    Filesize

    1.0MB

  • memory/2304-1079-0x000007FEF5F03000-0x000007FEF5F04000-memory.dmp

    Filesize

    4KB

  • memory/2304-1080-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2304-1081-0x00000000008A0000-0x000000000091A000-memory.dmp

    Filesize

    488KB

  • memory/2304-1082-0x000000001A750000-0x000000001A79C000-memory.dmp

    Filesize

    304KB

  • memory/2304-1083-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2304-1084-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2304-1085-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2304-2-0x0000000000450000-0x0000000000456000-memory.dmp

    Filesize

    24KB

  • memory/2304-1-0x00000000009E0000-0x0000000000A4C000-memory.dmp

    Filesize

    432KB

  • memory/2304-0-0x000007FEF5F03000-0x000007FEF5F04000-memory.dmp

    Filesize

    4KB

  • memory/2304-1086-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2304-1087-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp

    Filesize

    9.9MB

  • memory/2304-1088-0x000000001ACA0000-0x000000001ACF4000-memory.dmp

    Filesize

    336KB

  • memory/2304-1091-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp

    Filesize

    9.9MB