Analysis

  • max time kernel
    93s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 06:48

General

  • Target

    87ef7f0e2a5aae0d95289f867c9b4e8e784c945fc8eecaf6af8f12fa34031a98.exe

  • Size

    539KB

  • MD5

    4e3c2afdec28174ff80a76868e151ac7

  • SHA1

    8772ebb95b148011df1334d6d6b906e67d8a8d2f

  • SHA256

    87ef7f0e2a5aae0d95289f867c9b4e8e784c945fc8eecaf6af8f12fa34031a98

  • SHA512

    892c73fceb4117a873de54eb6300030664fffb61e2bf3e3b39c3644d1387f7993ef3945cd06566e88fd9950e8d23f9dd3deec5e017cc3f02b88d9f0e309726bd

  • SSDEEP

    6144:kK385DCmYzU1MYICxnVjvBWP45yeq5Jq0VCzfOXWwBI5S3K4YLgs9nG:kl5DCmYz/YPxZvBJTzzGXtBI5Z4Y8e

Malware Config

Extracted

Family

snakekeylogger

Credentials

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87ef7f0e2a5aae0d95289f867c9b4e8e784c945fc8eecaf6af8f12fa34031a98.exe
    "C:\Users\Admin\AppData\Local\Temp\87ef7f0e2a5aae0d95289f867c9b4e8e784c945fc8eecaf6af8f12fa34031a98.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3496
    • C:\Users\Admin\AppData\Local\Temp\87ef7f0e2a5aae0d95289f867c9b4e8e784c945fc8eecaf6af8f12fa34031a98.exe
      "C:\Users\Admin\AppData\Local\Temp\87ef7f0e2a5aae0d95289f867c9b4e8e784c945fc8eecaf6af8f12fa34031a98.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:464
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 1780
        3⤵
        • Program crash
        PID:4004
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 464 -ip 464
    1⤵
      PID:3440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\87ef7f0e2a5aae0d95289f867c9b4e8e784c945fc8eecaf6af8f12fa34031a98.exe.log

      Filesize

      706B

      MD5

      06291050cb4cf47123d1d60f3520af12

      SHA1

      8b51c73ef4ea0033a7404d11cf2ceadc273cb821

      SHA256

      daf03e5c336ea1f929b443ba45f1d96f33261a95482a3ea76029711c6947551f

      SHA512

      bc7fc296a39dde8ba60ae586bc8ed903d3df9c9bbdb100e615c4693b4b5a6518759e67cb0cb65f405e07391f7c59c7183ad236aa763e0504f4601a96ced8f919

    • memory/464-8-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/464-14-0x0000000074E20000-0x00000000755D0000-memory.dmp

      Filesize

      7.7MB

    • memory/464-13-0x0000000074E20000-0x00000000755D0000-memory.dmp

      Filesize

      7.7MB

    • memory/464-12-0x0000000074E20000-0x00000000755D0000-memory.dmp

      Filesize

      7.7MB

    • memory/3496-3-0x0000000005100000-0x0000000005192000-memory.dmp

      Filesize

      584KB

    • memory/3496-4-0x00000000051A0000-0x00000000051E2000-memory.dmp

      Filesize

      264KB

    • memory/3496-7-0x00000000051F0000-0x0000000005206000-memory.dmp

      Filesize

      88KB

    • memory/3496-6-0x0000000074E20000-0x00000000755D0000-memory.dmp

      Filesize

      7.7MB

    • memory/3496-5-0x00000000052E0000-0x000000000537C000-memory.dmp

      Filesize

      624KB

    • memory/3496-0-0x0000000074E2E000-0x0000000074E2F000-memory.dmp

      Filesize

      4KB

    • memory/3496-11-0x0000000074E20000-0x00000000755D0000-memory.dmp

      Filesize

      7.7MB

    • memory/3496-2-0x00000000055B0000-0x0000000005B54000-memory.dmp

      Filesize

      5.6MB

    • memory/3496-1-0x00000000006A0000-0x000000000072C000-memory.dmp

      Filesize

      560KB