Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 02:14
Static task
static1
Behavioral task
behavioral1
Sample
4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe
Resource
win10v2004-20241007-en
General
-
Target
4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe
-
Size
2.2MB
-
MD5
744261ecea7819afad73c744b60b7e93
-
SHA1
e6c2e03d6468b0193cc326fc52746063e937172b
-
SHA256
4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4
-
SHA512
8f8e49f2834024a93e3c9a4d0b4316814455e81ae737ffee1b55cff4f4189c7daa480d8da163f484ac51d8333f1221ebcbfaee4d585044a955caec4dd88365de
-
SSDEEP
12288:gOt1G044leEK+3ExXvA8fR5mPVr7iG2eXNPnrEdrEw:SLhEK0q/A8fR5mPVr7iGxXN/odow
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
reptw.xyz - Port:
587 - Username:
[email protected] - Password:
=W;D)NMYK*HI - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral2/memory/2008-7-0x0000000000770000-0x0000000000796000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation dfxzdg.exe -
Executes dropped EXE 2 IoCs
pid Process 4060 dfxzdg.exe 4656 dfxzdg.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 checkip.dyndns.org 15 freegeoip.app 16 freegeoip.app 30 freegeoip.app -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5020 set thread context of 2008 5020 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe 84 PID 4060 set thread context of 4656 4060 dfxzdg.exe 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2648 2008 WerFault.exe 84 2028 4656 WerFault.exe 106 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfxzdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfxzdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 796 schtasks.exe 4196 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2008 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe 4656 dfxzdg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5020 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe Token: SeDebugPrivilege 2008 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe Token: SeDebugPrivilege 4060 dfxzdg.exe Token: SeDebugPrivilege 4656 dfxzdg.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 5020 wrote to memory of 2008 5020 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe 84 PID 5020 wrote to memory of 2008 5020 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe 84 PID 5020 wrote to memory of 2008 5020 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe 84 PID 5020 wrote to memory of 2008 5020 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe 84 PID 5020 wrote to memory of 2008 5020 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe 84 PID 5020 wrote to memory of 2008 5020 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe 84 PID 5020 wrote to memory of 2008 5020 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe 84 PID 5020 wrote to memory of 2008 5020 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe 84 PID 5020 wrote to memory of 4560 5020 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe 91 PID 5020 wrote to memory of 4560 5020 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe 91 PID 5020 wrote to memory of 4560 5020 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe 91 PID 5020 wrote to memory of 2708 5020 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe 93 PID 5020 wrote to memory of 2708 5020 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe 93 PID 5020 wrote to memory of 2708 5020 4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe 93 PID 4560 wrote to memory of 796 4560 cmd.exe 95 PID 4560 wrote to memory of 796 4560 cmd.exe 95 PID 4560 wrote to memory of 796 4560 cmd.exe 95 PID 4060 wrote to memory of 4656 4060 dfxzdg.exe 106 PID 4060 wrote to memory of 4656 4060 dfxzdg.exe 106 PID 4060 wrote to memory of 4656 4060 dfxzdg.exe 106 PID 4060 wrote to memory of 4656 4060 dfxzdg.exe 106 PID 4060 wrote to memory of 4656 4060 dfxzdg.exe 106 PID 4060 wrote to memory of 4656 4060 dfxzdg.exe 106 PID 4060 wrote to memory of 4656 4060 dfxzdg.exe 106 PID 4060 wrote to memory of 4656 4060 dfxzdg.exe 106 PID 4060 wrote to memory of 2240 4060 dfxzdg.exe 107 PID 4060 wrote to memory of 2240 4060 dfxzdg.exe 107 PID 4060 wrote to memory of 2240 4060 dfxzdg.exe 107 PID 4060 wrote to memory of 3952 4060 dfxzdg.exe 108 PID 4060 wrote to memory of 3952 4060 dfxzdg.exe 108 PID 4060 wrote to memory of 3952 4060 dfxzdg.exe 108 PID 2240 wrote to memory of 4196 2240 cmd.exe 112 PID 2240 wrote to memory of 4196 2240 cmd.exe 112 PID 2240 wrote to memory of 4196 2240 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe"C:\Users\Admin\AppData\Local\Temp\4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe"C:\Users\Admin\AppData\Local\Temp\4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 17603⤵
- Program crash
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:796
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\4c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4.exe" "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2008 -ip 20081⤵PID:1428
-
C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exeC:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 17883⤵
- Program crash
PID:2028
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4196
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe" "C:\Users\Admin\AppData\Roaming\dfxzdg\dfxzdg.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4656 -ip 46561⤵PID:4032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5744261ecea7819afad73c744b60b7e93
SHA1e6c2e03d6468b0193cc326fc52746063e937172b
SHA2564c70310a239bb05c148151740e3cbccf787c13a33c6f9f5a8f9c75216ed43af4
SHA5128f8e49f2834024a93e3c9a4d0b4316814455e81ae737ffee1b55cff4f4189c7daa480d8da163f484ac51d8333f1221ebcbfaee4d585044a955caec4dd88365de