Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 03:28
Static task
static1
Behavioral task
behavioral1
Sample
eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd.exe
Resource
win10v2004-20241007-en
General
-
Target
eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd.exe
-
Size
1.4MB
-
MD5
e717ed3845849e9a3bfbb53c8ecb87f2
-
SHA1
7ae3a696867e9fb90d2633672801ff8dcc6d0d6c
-
SHA256
eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd
-
SHA512
97aecfe61a881a1791a396ee92f6c3b18a7a21bcbfb80f5cda69f81678863119c2220eb102e7233512483f95c2588a0e5955762036ced72d658ab2b9a936b8da
-
SSDEEP
12288:h1Ql5Z04nr+u96ovJI3pmnbjvLb1H9u60Bj3tqxpopll2L+aB:hWLP9Z4GnLBH9/Qtqczha
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
sqlv#))OxYLxAXyhMyi
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral1/memory/3864-1092-0x00000000005C0000-0x00000000005E4000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 checkip.dyndns.org -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3048 eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd.exe 3048 eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd.exe 3048 eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd.exe 3048 eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd.exe 3864 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3048 eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd.exe Token: SeDebugPrivilege 3048 eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd.exe Token: SeDebugPrivilege 3864 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3048 wrote to memory of 3864 3048 eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd.exe 31 PID 3048 wrote to memory of 3864 3048 eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd.exe 31 PID 3048 wrote to memory of 3864 3048 eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd.exe 31 PID 3048 wrote to memory of 3864 3048 eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd.exe 31 PID 3864 wrote to memory of 2880 3864 aspnet_compiler.exe 34 PID 3864 wrote to memory of 2880 3864 aspnet_compiler.exe 34 PID 3864 wrote to memory of 2880 3864 aspnet_compiler.exe 34 PID 2880 wrote to memory of 336 2880 cmd.exe 36 PID 2880 wrote to memory of 336 2880 cmd.exe 36 PID 2880 wrote to memory of 336 2880 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd.exe"C:\Users\Admin\AppData\Local\Temp\eb52bf1a53d28600ebc350ea1ffdffe1fb619ac9bd2070200fa8b39c8f30a8cd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 34⤵PID:336
-
-
-