Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
90848c37456f162fccbaf5d52c476fdd73d42522701461bf37a1d55bb31f564b.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
90848c37456f162fccbaf5d52c476fdd73d42522701461bf37a1d55bb31f564b.exe
Resource
win10v2004-20241007-en
General
-
Target
90848c37456f162fccbaf5d52c476fdd73d42522701461bf37a1d55bb31f564b.exe
-
Size
1.5MB
-
MD5
fecf54a27dcb1e2b7efbebf01a6c6c48
-
SHA1
d1fe59233d618c9edf97dd138bcdf48dfc3c3f07
-
SHA256
90848c37456f162fccbaf5d52c476fdd73d42522701461bf37a1d55bb31f564b
-
SHA512
793addb938b2884e07fc1bcc23a4d5f60c14791c2b42e59d91240a2ee47adc0345d4d9a695bc49953f5eb6653d241dd2e15e83246e3c44c674c16a16f1bd288c
-
SSDEEP
24576:S45atrPaNBwGaO0bAuLz+uw2B+3ohnqtH0tGf:SCQP4paOQvND+3ohw0t2
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
JOYEss..&UK55@@!! - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral1/memory/4700-1194-0x0000000002580000-0x00000000025A4000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2704 90848c37456f162fccbaf5d52c476fdd73d42522701461bf37a1d55bb31f564b.exe 4700 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2704 90848c37456f162fccbaf5d52c476fdd73d42522701461bf37a1d55bb31f564b.exe Token: SeDebugPrivilege 2704 90848c37456f162fccbaf5d52c476fdd73d42522701461bf37a1d55bb31f564b.exe Token: SeDebugPrivilege 4700 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2704 wrote to memory of 4700 2704 90848c37456f162fccbaf5d52c476fdd73d42522701461bf37a1d55bb31f564b.exe 30 PID 2704 wrote to memory of 4700 2704 90848c37456f162fccbaf5d52c476fdd73d42522701461bf37a1d55bb31f564b.exe 30 PID 2704 wrote to memory of 4700 2704 90848c37456f162fccbaf5d52c476fdd73d42522701461bf37a1d55bb31f564b.exe 30 PID 2704 wrote to memory of 4700 2704 90848c37456f162fccbaf5d52c476fdd73d42522701461bf37a1d55bb31f564b.exe 30 PID 4700 wrote to memory of 4960 4700 aspnet_compiler.exe 32 PID 4700 wrote to memory of 4960 4700 aspnet_compiler.exe 32 PID 4700 wrote to memory of 4960 4700 aspnet_compiler.exe 32 PID 4960 wrote to memory of 4992 4960 cmd.exe 34 PID 4960 wrote to memory of 4992 4960 cmd.exe 34 PID 4960 wrote to memory of 4992 4960 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\90848c37456f162fccbaf5d52c476fdd73d42522701461bf37a1d55bb31f564b.exe"C:\Users\Admin\AppData\Local\Temp\90848c37456f162fccbaf5d52c476fdd73d42522701461bf37a1d55bb31f564b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 34⤵PID:4992
-
-
-