Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 14:52
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION_DECQTRA071244PDF.scr.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
QUOTATION_DECQTRA071244PDF.scr.exe
Resource
win10v2004-20241007-en
General
-
Target
QUOTATION_DECQTRA071244PDF.scr.exe
-
Size
1.5MB
-
MD5
fecf54a27dcb1e2b7efbebf01a6c6c48
-
SHA1
d1fe59233d618c9edf97dd138bcdf48dfc3c3f07
-
SHA256
90848c37456f162fccbaf5d52c476fdd73d42522701461bf37a1d55bb31f564b
-
SHA512
793addb938b2884e07fc1bcc23a4d5f60c14791c2b42e59d91240a2ee47adc0345d4d9a695bc49953f5eb6653d241dd2e15e83246e3c44c674c16a16f1bd288c
-
SSDEEP
24576:S45atrPaNBwGaO0bAuLz+uw2B+3ohnqtH0tGf:SCQP4paOQvND+3ohw0t2
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
JOYEss..&UK55@@!! - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral1/memory/4700-1192-0x0000000000AC0000-0x0000000000AE4000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2340 QUOTATION_DECQTRA071244PDF.scr.exe 4700 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2340 QUOTATION_DECQTRA071244PDF.scr.exe Token: SeDebugPrivilege 2340 QUOTATION_DECQTRA071244PDF.scr.exe Token: SeDebugPrivilege 4700 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2340 wrote to memory of 4700 2340 QUOTATION_DECQTRA071244PDF.scr.exe 31 PID 2340 wrote to memory of 4700 2340 QUOTATION_DECQTRA071244PDF.scr.exe 31 PID 2340 wrote to memory of 4700 2340 QUOTATION_DECQTRA071244PDF.scr.exe 31 PID 2340 wrote to memory of 4700 2340 QUOTATION_DECQTRA071244PDF.scr.exe 31 PID 4700 wrote to memory of 4992 4700 aspnet_compiler.exe 33 PID 4700 wrote to memory of 4992 4700 aspnet_compiler.exe 33 PID 4700 wrote to memory of 4992 4700 aspnet_compiler.exe 33 PID 4992 wrote to memory of 5028 4992 cmd.exe 35 PID 4992 wrote to memory of 5028 4992 cmd.exe 35 PID 4992 wrote to memory of 5028 4992 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION_DECQTRA071244PDF.scr.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION_DECQTRA071244PDF.scr.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 34⤵PID:5028
-
-
-