Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 05:32
Static task
static1
Behavioral task
behavioral1
Sample
ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe
Resource
win10v2004-20241007-en
General
-
Target
ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe
-
Size
811KB
-
MD5
22a9330757374b6b15f04e37c4ace8e6
-
SHA1
021e607efad2b2e256c4b3e6e1ad03bcb534a1fe
-
SHA256
ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7
-
SHA512
6b78603c3b6f600c2f923bc08474e12537945928383901677ca380ce3b3beba3b3d29a67004d36599619d7c7413291b36836dc3952709e7c2da8241650310a87
-
SSDEEP
12288:/wMiwy9EXX+Rdw0kIQa+eeAoAwnPrGcthicFkgR74u8K8j0AH0+L5iTkR:MwFOlTQateDH7KI7Ba0e5iG
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.cepro.co.in - Port:
587 - Username:
[email protected] - Password:
2018@ce#03 - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 5 IoCs
resource yara_rule behavioral1/memory/1528-118-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1528-117-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1528-116-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1528-113-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/1528-111-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1656 powershell.exe 1692 powershell.exe -
Deletes itself 1 IoCs
pid Process 1556 cmd.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 reallyfreegeoip.org 11 reallyfreegeoip.org 6 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1500 set thread context of 1528 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46\Blob = 0f0000000100000014000000f45a0858c9cd920e647bad539ab9f1cfc77f24cb090000000100000016000000301406082b0601050507030306082b06010505070308140000000100000014000000daed6474149c143cabdd99a9bd5b284d8b3cc9d80b000000010000001400000055005300450052005400720075007300740000001d0000000100000010000000f919b9ccce1e59c2e785f7dc2ccf6708030000000100000014000000e12dfb4b41d7d9c32b30514bac1d81d8385e2d4620000000010000006a040000308204663082034ea003020102021044be0c8b500024b411d3362de0b35f1b300d06092a864886f70d0101050500308195310b3009060355040613025553310b3009060355040813025554311730150603550407130e53616c74204c616b652043697479311e301c060355040a131554686520555345525452555354204e6574776f726b3121301f060355040b1318687474703a2f2f7777772e7573657274727573742e636f6d311d301b0603550403131455544e2d5553455246697273742d4f626a656374301e170d3939303730393138333132305a170d3139303730393138343033365a308195310b3009060355040613025553310b3009060355040813025554311730150603550407130e53616c74204c616b652043697479311e301c060355040a131554686520555345525452555354204e6574776f726b3121301f060355040b1318687474703a2f2f7777772e7573657274727573742e636f6d311d301b0603550403131455544e2d5553455246697273742d4f626a65637430820122300d06092a864886f70d01010105000382010f003082010a0282010100ceaa813fa3a36178aa31005595119e270f1f1cdf3a9b826830c04a611df12f0efabe79f7a523ef55519684cddbe3b96e3e31d80a2067c7f4d9bf94eb47043e02ce2aa25d870409f6309d188a97b2aa1cfc41d2a136cbfb3d91bae7d97035fae4e790c39ba39bd33cf5129977b1b709e068e61cb8f39463886a6afe0b76c9bef422e467b9ab1a5e77c18507dd0d6cbfee06c7776a419ea70fd7fbee9417b7fc85bea4abc41c31ddd7b6d1e4f0efdf168fb25293d7a1d489a1072ebfe10112421e1ae1d89534db647928ffba2e11c2e5e85b9248fb470bc26cdaad328341f3a5e54170fd65906dfafa51c4f9bd962b19042cd36da7dcf07f6f8365e26aab8786750203010001a381af3081ac300b0603551d0f0404030201c6300f0603551d130101ff040530030101ff301d0603551d0e04160414daed6474149c143cabdd99a9bd5b284d8b3cc9d830420603551d1f043b30393037a035a0338631687474703a2f2f63726c2e7573657274727573742e636f6d2f55544e2d5553455246697273742d4f626a6563742e63726c30290603551d250422302006082b0601050507030306082b06010505070308060a2b0601040182370a0304300d06092a864886f70d01010505000382010100081f52b1374478dbfdceb9da959698aa556480b55a40dd21a5c5c1f35f2c4cc8475a69eae8f03535f4d025f3c8a6a4874abd1bb17308bdd4c3cab635bb59867731cda78014ae13effcb148f96b25252d51b62c6d45c198c88a565d3eee434e3e6b278ed03a4b850b5fd3ed6aa775cbd15a872f3975135a72b002819fbef00f845420626c69d4e14dc60d9943010d12968c789dbf50a2b144aa6acf177acf6f0fd4f824555ff0341649663e5046c96371383162b862b9f353ad6cb52ba212aa194f09da5ee793c68e1408fef0308018a086854dc87dd78b03fe6ed5f79d16ac922ca023e59c91521f94df179473c3b3c1c17105200078bd13521da83ecd001fc8 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46\Blob = 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 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1852 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 1528 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 1656 powershell.exe 1692 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe Token: SeDebugPrivilege 1528 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe Token: SeDebugPrivilege 1656 powershell.exe Token: SeDebugPrivilege 1692 powershell.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1500 wrote to memory of 1656 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 31 PID 1500 wrote to memory of 1656 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 31 PID 1500 wrote to memory of 1656 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 31 PID 1500 wrote to memory of 1656 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 31 PID 1500 wrote to memory of 1692 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 33 PID 1500 wrote to memory of 1692 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 33 PID 1500 wrote to memory of 1692 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 33 PID 1500 wrote to memory of 1692 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 33 PID 1500 wrote to memory of 1852 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 35 PID 1500 wrote to memory of 1852 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 35 PID 1500 wrote to memory of 1852 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 35 PID 1500 wrote to memory of 1852 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 35 PID 1500 wrote to memory of 1528 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 37 PID 1500 wrote to memory of 1528 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 37 PID 1500 wrote to memory of 1528 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 37 PID 1500 wrote to memory of 1528 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 37 PID 1500 wrote to memory of 1528 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 37 PID 1500 wrote to memory of 1528 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 37 PID 1500 wrote to memory of 1528 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 37 PID 1500 wrote to memory of 1528 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 37 PID 1500 wrote to memory of 1528 1500 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 37 PID 1528 wrote to memory of 1556 1528 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 38 PID 1528 wrote to memory of 1556 1528 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 38 PID 1528 wrote to memory of 1556 1528 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 38 PID 1528 wrote to memory of 1556 1528 ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe 38 PID 1556 wrote to memory of 2040 1556 cmd.exe 40 PID 1556 wrote to memory of 2040 1556 cmd.exe 40 PID 1556 wrote to memory of 2040 1556 cmd.exe 40 PID 1556 wrote to memory of 2040 1556 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe"C:\Users\Admin\AppData\Local\Temp\ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ywKvCTGbQjXP.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ywKvCTGbQjXP" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2428.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe"C:\Users\Admin\AppData\Local\Temp\ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe"2⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\ddfbc9803252f22c7a06d2e1a1fd8617f3e5313cd0493809839aa6907291e7c7.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵
- System Location Discovery: System Language Discovery
PID:2040
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD5692a086ada75cc3533f84d3e97ba93c7
SHA1ef1f38072bab7b2bf98494196194a277171332ef
SHA256471e936d18539ccb99eb0f2652c2b93c382a6e10fed7830cd3ff699d9327e9ad
SHA512aed99986a6bdd6a9dd370b6f50b874b70e1e1ca7b09dc2496db4f047e1ef0cbc7b7757fbb2739c0d19fcc105d6f84e968ce141291a7f7e22aee48016fc65324a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PIP2O17KEV8QR5TPVKZK.temp
Filesize7KB
MD5ed6e12bc709bef52542d2ce4d3262233
SHA1bf43923c03331c590c36434d66fba37a1970082e
SHA256fe75ce972bd9f5e6c825e128f6ebe65f5aab64afb15e5a427a5ffb89cc52c622
SHA512237795faea5c5d6c64cd578508e7d629bf6110bbfcb4e17c9c791ffdb72e4e0255ffceebcd2dfb4a68d9d3c93040006a56ab4c92f371cec3f252afa3602cb5ff