Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 03:00
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION_NOVQTRA071244PDF.scr
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
QUOTATION_NOVQTRA071244PDF.scr
Resource
win10v2004-20241007-en
General
-
Target
QUOTATION_NOVQTRA071244PDF.scr
-
Size
1.4MB
-
MD5
9c6de69b3f4bd16dc76a37fd8a50aea4
-
SHA1
a5c6f87a637a6e5ffd073dc90a3cbfa0591160c1
-
SHA256
137ad88b1c43f6aa6f01b9b8a7b15027387d501dbe7af463a7b639f5abf3f116
-
SHA512
255dbc20c850d91eaccbe338b99ef1e144af703e6bc88c70f8d8d0f6dd2089cbbc6ddb2f8b4dccd6770c75bc21176ae41566eb995d58645ae0a86d42ef1d3841
-
SSDEEP
12288:Yx093lfiCZNsgg/iUZ0vXTWyzopB2QrJ30Bme47vAn+TbzeB:YIiFzj+vXhzop5rJ3gmYSe
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
G!!HFpD@N*]*nF
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral1/memory/5032-1093-0x00000000026A0000-0x00000000026C4000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 checkip.dyndns.org -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2416 QUOTATION_NOVQTRA071244PDF.scr 2416 QUOTATION_NOVQTRA071244PDF.scr 2416 QUOTATION_NOVQTRA071244PDF.scr 2416 QUOTATION_NOVQTRA071244PDF.scr 5032 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2416 QUOTATION_NOVQTRA071244PDF.scr Token: SeDebugPrivilege 2416 QUOTATION_NOVQTRA071244PDF.scr Token: SeDebugPrivilege 5032 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2416 wrote to memory of 5032 2416 QUOTATION_NOVQTRA071244PDF.scr 32 PID 2416 wrote to memory of 5032 2416 QUOTATION_NOVQTRA071244PDF.scr 32 PID 2416 wrote to memory of 5032 2416 QUOTATION_NOVQTRA071244PDF.scr 32 PID 2416 wrote to memory of 5032 2416 QUOTATION_NOVQTRA071244PDF.scr 32 PID 5032 wrote to memory of 2360 5032 aspnet_compiler.exe 35 PID 5032 wrote to memory of 2360 5032 aspnet_compiler.exe 35 PID 5032 wrote to memory of 2360 5032 aspnet_compiler.exe 35 PID 2360 wrote to memory of 444 2360 cmd.exe 37 PID 2360 wrote to memory of 444 2360 cmd.exe 37 PID 2360 wrote to memory of 444 2360 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION_NOVQTRA071244PDF.scr"C:\Users\Admin\AppData\Local\Temp\QUOTATION_NOVQTRA071244PDF.scr" /S1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 34⤵PID:444
-
-
-