Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-01-2025 08:08

General

  • Target

    zamówienia 31012025DJ ZK 25010325_pdf .scr

  • Size

    30KB

  • MD5

    08bb8be80a2856a077319f59990154a9

  • SHA1

    373db0eedecdd0bb8e3e2457f4390e3a363e1ad6

  • SHA256

    61abb5aa05411cf92a1d762864cc824d594ffdd2dad4c2ca7f1c2f0c30e2a786

  • SHA512

    b11f003396781bc595c3a7eed18fd3322d23b0bdfc97450d8990060c6f49877d9e7b2e17beaa21a3bf4229d037043985a68962f79192b76ae41f5305b06bf37b

  • SSDEEP

    768:F8tDJhV6NTXJabo47/5xxwHBfKuL7BykI8:F8tDJhVKjJabog5/SXBykb

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8018149517:AAGK_JH2rbFUhupxezqUln9lvYu9km5btWY/sendMessage?chat_id=7250529719

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3396
      • C:\Users\Admin\AppData\Local\Temp\zamówienia 31012025DJ ZK 25010325_pdf .scr
        "C:\Users\Admin\AppData\Local\Temp\zamówienia 31012025DJ ZK 25010325_pdf .scr" /S
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4036
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:4772

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4036-0-0x00007FF9A6F63000-0x00007FF9A6F65000-memory.dmp

      Filesize

      8KB

    • memory/4036-1-0x000001CB575F0000-0x000001CB575FA000-memory.dmp

      Filesize

      40KB

    • memory/4036-2-0x00007FF9A6F60000-0x00007FF9A7A21000-memory.dmp

      Filesize

      10.8MB

    • memory/4036-3-0x000001CB71C50000-0x000001CB71D58000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-11-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-21-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-67-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-65-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-63-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-61-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-59-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-57-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-55-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-53-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-49-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-47-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-45-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-43-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-41-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-39-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-37-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-35-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-33-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-31-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-29-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-27-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-25-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-19-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-18-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-15-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-13-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-9-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-7-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-51-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-23-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-5-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-4-0x000001CB71C50000-0x000001CB71D52000-memory.dmp

      Filesize

      1.0MB

    • memory/4036-365-0x00007FF9A6F60000-0x00007FF9A7A21000-memory.dmp

      Filesize

      10.8MB

    • memory/4036-1327-0x00007FF9A6F60000-0x00007FF9A7A21000-memory.dmp

      Filesize

      10.8MB

    • memory/4036-1328-0x000001CB71D60000-0x000001CB71DC2000-memory.dmp

      Filesize

      392KB

    • memory/4036-1329-0x000001CB71DC0000-0x000001CB71E20000-memory.dmp

      Filesize

      384KB

    • memory/4036-1330-0x000001CB71EE0000-0x000001CB71F2C000-memory.dmp

      Filesize

      304KB

    • memory/4036-1331-0x00007FF9A6F60000-0x00007FF9A7A21000-memory.dmp

      Filesize

      10.8MB

    • memory/4036-1332-0x00007FF9A6F60000-0x00007FF9A7A21000-memory.dmp

      Filesize

      10.8MB

    • memory/4036-1333-0x00007FF9A6F60000-0x00007FF9A7A21000-memory.dmp

      Filesize

      10.8MB

    • memory/4036-1334-0x00007FF9A6F60000-0x00007FF9A7A21000-memory.dmp

      Filesize

      10.8MB

    • memory/4036-1335-0x000001CB71F30000-0x000001CB71F84000-memory.dmp

      Filesize

      336KB

    • memory/4036-1340-0x00007FF9A6F60000-0x00007FF9A7A21000-memory.dmp

      Filesize

      10.8MB

    • memory/4036-1342-0x00007FF9A6F60000-0x00007FF9A7A21000-memory.dmp

      Filesize

      10.8MB

    • memory/4036-1343-0x00007FF9A6F60000-0x00007FF9A7A21000-memory.dmp

      Filesize

      10.8MB

    • memory/4772-1344-0x0000000140000000-0x0000000140024000-memory.dmp

      Filesize

      144KB

    • memory/4772-1345-0x00007FF9A6F60000-0x00007FF9A7A21000-memory.dmp

      Filesize

      10.8MB

    • memory/4772-1346-0x00007FF9A6F60000-0x00007FF9A7A21000-memory.dmp

      Filesize

      10.8MB

    • memory/4772-1347-0x0000024D3EE60000-0x0000024D3EEB0000-memory.dmp

      Filesize

      320KB

    • memory/4772-1348-0x0000024D57AB0000-0x0000024D57C72000-memory.dmp

      Filesize

      1.8MB

    • memory/4772-1349-0x00007FF9A6F60000-0x00007FF9A7A21000-memory.dmp

      Filesize

      10.8MB