Analysis

  • max time kernel
    121s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2025 08:44

General

  • Target

    Faktura VAT-FV2025011500091._pdf .scr.exe

  • Size

    403KB

  • MD5

    d1ce79b1ed07c976f65e3f715eebb42d

  • SHA1

    86fd4ef7598e6795379361a3bc931a6fa446cd4b

  • SHA256

    b0da8ee7ba9f7867231c71a57402f66ee0a42b89fb130768a680cd0f5c6bbfe7

  • SHA512

    51e49160cc915cad92a260bf58ecb7997890336d4402334952069d975cd9ceba17eee7e4e88d99459d81f45d03291c930aad0cd3a65bbe3c65f6e05ba63885c9

  • SSDEEP

    6144:8TErM9in42rv0JkLKpmNG4IST9K+WGCIe8zpDmStL0qGV0lT+BU/rHFV1euZbIus:N94284IS8RODRXkupCuqtaZd

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7307271992:AAF4MiqD71uea9mzZkKlV2piolfd9UoXP7A/sendMessage?chat_id=1018401531

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3428
      • C:\Users\Admin\AppData\Local\Temp\Faktura VAT-FV2025011500091._pdf .scr.exe
        "C:\Users\Admin\AppData\Local\Temp\Faktura VAT-FV2025011500091._pdf .scr.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:336
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:4740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/336-0-0x00007FFE394C3000-0x00007FFE394C5000-memory.dmp

      Filesize

      8KB

    • memory/336-1-0x000001CB1B8A0000-0x000001CB1B908000-memory.dmp

      Filesize

      416KB

    • memory/336-2-0x00007FFE394C0000-0x00007FFE39F81000-memory.dmp

      Filesize

      10.8MB

    • memory/336-3-0x000001CB36070000-0x000001CB36178000-memory.dmp

      Filesize

      1.0MB

    • memory/336-17-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-25-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-67-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-65-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-64-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-61-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-59-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-57-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-53-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-51-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-49-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-47-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-45-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-43-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-41-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-37-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-35-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-31-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-29-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-27-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-23-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-21-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-19-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-15-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-13-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-11-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-9-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-7-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-55-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-39-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-33-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-5-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-4-0x000001CB36070000-0x000001CB36172000-memory.dmp

      Filesize

      1.0MB

    • memory/336-1326-0x00007FFE394C0000-0x00007FFE39F81000-memory.dmp

      Filesize

      10.8MB

    • memory/336-1327-0x000001CB35D50000-0x000001CB35DB2000-memory.dmp

      Filesize

      392KB

    • memory/336-1328-0x000001CB35DB0000-0x000001CB35E10000-memory.dmp

      Filesize

      384KB

    • memory/336-1329-0x000001CB372A0000-0x000001CB372EC000-memory.dmp

      Filesize

      304KB

    • memory/336-1331-0x00007FFE394C3000-0x00007FFE394C5000-memory.dmp

      Filesize

      8KB

    • memory/336-1330-0x00007FFE394C0000-0x00007FFE39F81000-memory.dmp

      Filesize

      10.8MB

    • memory/336-1332-0x00007FFE394C0000-0x00007FFE39F81000-memory.dmp

      Filesize

      10.8MB

    • memory/336-1333-0x00007FFE394C0000-0x00007FFE39F81000-memory.dmp

      Filesize

      10.8MB

    • memory/336-1334-0x00007FFE394C0000-0x00007FFE39F81000-memory.dmp

      Filesize

      10.8MB

    • memory/336-1335-0x000001CB372F0000-0x000001CB37344000-memory.dmp

      Filesize

      336KB

    • memory/336-1341-0x00007FFE394C0000-0x00007FFE39F81000-memory.dmp

      Filesize

      10.8MB

    • memory/336-1343-0x00007FFE394C0000-0x00007FFE39F81000-memory.dmp

      Filesize

      10.8MB

    • memory/336-1344-0x00007FFE394C0000-0x00007FFE39F81000-memory.dmp

      Filesize

      10.8MB

    • memory/4740-1342-0x0000000140000000-0x0000000140024000-memory.dmp

      Filesize

      144KB

    • memory/4740-1345-0x00007FFE394C0000-0x00007FFE39F81000-memory.dmp

      Filesize

      10.8MB

    • memory/4740-1346-0x00007FFE394C0000-0x00007FFE39F81000-memory.dmp

      Filesize

      10.8MB

    • memory/4740-1347-0x00000194CFA00000-0x00000194CFA50000-memory.dmp

      Filesize

      320KB

    • memory/4740-1348-0x00000194E85F0000-0x00000194E87B2000-memory.dmp

      Filesize

      1.8MB

    • memory/4740-1349-0x00007FFE394C0000-0x00007FFE39F81000-memory.dmp

      Filesize

      10.8MB