Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 11:29
Static task
static1
Behavioral task
behavioral1
Sample
ungziped_file.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ungziped_file.exe
Resource
win10v2004-20241007-en
General
-
Target
ungziped_file.exe
-
Size
1.1MB
-
MD5
294aa30e1d8387a1f810490c59907228
-
SHA1
5d6b402745679b55132ee21e7f09909b57ddf694
-
SHA256
bd359e9c378164ced9b83d3b0e76f94bda81911fd848b44aed89275ff7b1c314
-
SHA512
024f6c6bf6e5d194789e0f1f556d9fa53531506e14078764c56a59a292237384984e13eb56d8cb76a8913e219ddb281bccb68898fb990dc271e0f95c074d3c3d
-
SSDEEP
24576:tqDEvCTbMWu7rQYlBQcBiT6rprG8a8zoYdLVBTA4dinbn:tTvC/MTQYxsWR7a8z5AGg
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot1628099890:AAEoyPqXzUZV0NK78yRGbDMLJqRw0vcASbg/sendMessage?chat_id=1217600190
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 3 IoCs
resource yara_rule behavioral1/memory/2804-14-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2804-17-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2804-18-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\proximobuccal.vbs proximobuccal.exe -
Executes dropped EXE 1 IoCs
pid Process 2160 proximobuccal.exe -
Loads dropped DLL 1 IoCs
pid Process 2712 ungziped_file.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 reallyfreegeoip.org 4 checkip.dyndns.org 8 reallyfreegeoip.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000014ba6-4.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2160 set thread context of 2804 2160 proximobuccal.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ungziped_file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language proximobuccal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2804 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2160 proximobuccal.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2804 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2712 ungziped_file.exe 2712 ungziped_file.exe 2160 proximobuccal.exe 2160 proximobuccal.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2712 ungziped_file.exe 2712 ungziped_file.exe 2160 proximobuccal.exe 2160 proximobuccal.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2160 2712 ungziped_file.exe 28 PID 2712 wrote to memory of 2160 2712 ungziped_file.exe 28 PID 2712 wrote to memory of 2160 2712 ungziped_file.exe 28 PID 2712 wrote to memory of 2160 2712 ungziped_file.exe 28 PID 2160 wrote to memory of 2804 2160 proximobuccal.exe 29 PID 2160 wrote to memory of 2804 2160 proximobuccal.exe 29 PID 2160 wrote to memory of 2804 2160 proximobuccal.exe 29 PID 2160 wrote to memory of 2804 2160 proximobuccal.exe 29 PID 2160 wrote to memory of 2804 2160 proximobuccal.exe 29 PID 2160 wrote to memory of 2804 2160 proximobuccal.exe 29 PID 2160 wrote to memory of 2804 2160 proximobuccal.exe 29 PID 2160 wrote to memory of 2804 2160 proximobuccal.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ungziped_file.exe"C:\Users\Admin\AppData\Local\Temp\ungziped_file.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\asset\proximobuccal.exe"C:\Users\Admin\AppData\Local\Temp\ungziped_file.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\ungziped_file.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD507a7fa5482236d7dde34672290811816
SHA14c79d989702d4f230300a21f21ab515b2c52ea32
SHA256c5a6cce3dd19028cc5bb92fefe45df4763c2fbaa5483dcf9405773f429efc21b
SHA51207b7a0b23cd039aca61b07452477bdac3954a5e3c3cbd7a5eb59fc724f7acea5f1c2a92269da212d666d83b6ae7d413734deffb9b7af2ecb495368b60e59af9d
-
Filesize
1.1MB
MD5294aa30e1d8387a1f810490c59907228
SHA15d6b402745679b55132ee21e7f09909b57ddf694
SHA256bd359e9c378164ced9b83d3b0e76f94bda81911fd848b44aed89275ff7b1c314
SHA512024f6c6bf6e5d194789e0f1f556d9fa53531506e14078764c56a59a292237384984e13eb56d8cb76a8913e219ddb281bccb68898fb990dc271e0f95c074d3c3d