Analysis
-
max time kernel
91s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-02-2025 02:41
Static task
static1
Behavioral task
behavioral1
Sample
beenieT.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
beenieT.exe
Resource
win10v2004-20250217-en
General
-
Target
beenieT.exe
-
Size
627KB
-
MD5
01adfbc94da06851348026ba175876f4
-
SHA1
afab7627513aeab150cb27609e2ee3ddf3062c8e
-
SHA256
027704a79bc8bc9533c0d2d20c15ff824be56a280512e2305ac66dea22e91f70
-
SHA512
93dc93dcd9d87afc731258aaedb999776dcbe5421116f9ad71dae54f9ec8ccfaca02c80a212a04d16391f4ed6530b5f46c4554ada935d940b0f2fe163a174771
-
SSDEEP
12288:6xgmXcBFdytRXdvtaFFPiYK41HU/iZqRNyVTZlqPxUN6Kk+ycR/3w2FirEukR:uZAFQnmFPiYKJZNcTipUNrk/92Qk
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7465931215:AAEEB2buL-YODXHMy33u4S1TgD90QPF6Te0/sendMessage?chat_id=7519150590
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 5 IoCs
resource yara_rule behavioral1/memory/3020-28-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/3020-30-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/3020-29-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/3020-25-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/3020-23-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2644 powershell.exe 2552 powershell.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 beenieT.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 beenieT.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 beenieT.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org 8 reallyfreegeoip.org 9 reallyfreegeoip.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2188 set thread context of 3020 2188 beenieT.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beenieT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beenieT.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2188 beenieT.exe 2188 beenieT.exe 3020 beenieT.exe 2552 powershell.exe 2644 powershell.exe 3020 beenieT.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2188 beenieT.exe Token: SeDebugPrivilege 3020 beenieT.exe Token: SeDebugPrivilege 2552 powershell.exe Token: SeDebugPrivilege 2644 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2644 2188 beenieT.exe 30 PID 2188 wrote to memory of 2644 2188 beenieT.exe 30 PID 2188 wrote to memory of 2644 2188 beenieT.exe 30 PID 2188 wrote to memory of 2644 2188 beenieT.exe 30 PID 2188 wrote to memory of 2552 2188 beenieT.exe 32 PID 2188 wrote to memory of 2552 2188 beenieT.exe 32 PID 2188 wrote to memory of 2552 2188 beenieT.exe 32 PID 2188 wrote to memory of 2552 2188 beenieT.exe 32 PID 2188 wrote to memory of 2696 2188 beenieT.exe 34 PID 2188 wrote to memory of 2696 2188 beenieT.exe 34 PID 2188 wrote to memory of 2696 2188 beenieT.exe 34 PID 2188 wrote to memory of 2696 2188 beenieT.exe 34 PID 2188 wrote to memory of 3020 2188 beenieT.exe 36 PID 2188 wrote to memory of 3020 2188 beenieT.exe 36 PID 2188 wrote to memory of 3020 2188 beenieT.exe 36 PID 2188 wrote to memory of 3020 2188 beenieT.exe 36 PID 2188 wrote to memory of 3020 2188 beenieT.exe 36 PID 2188 wrote to memory of 3020 2188 beenieT.exe 36 PID 2188 wrote to memory of 3020 2188 beenieT.exe 36 PID 2188 wrote to memory of 3020 2188 beenieT.exe 36 PID 2188 wrote to memory of 3020 2188 beenieT.exe 36 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 beenieT.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 beenieT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\beenieT.exe"C:\Users\Admin\AppData\Local\Temp\beenieT.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\beenieT.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\aqojft.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aqojft" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9231.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\beenieT.exe"C:\Users\Admin\AppData\Local\Temp\beenieT.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50366721e4ca614a98a54511e6af01324
SHA12cf34f5beb706c205c6e51621f920801b9495427
SHA2561709b8525c909bb6ee8ffd090ed4278e14def3ff6b6efe29c603000621bb055d
SHA512f23d00fc69906dd6333ce3961caaca632827ac0dfcaddfb306534242f644f034c6627364e80347306c24bf28d8f913d85d78a8ba772fbe11bb5dc759eed77ac6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD58fad3bff50f8e48f2912f7eb7b6bbe7a
SHA12e3fe35977e24ab423fca34bb16769d60de3bad5
SHA256399134f99dfe87e63e454b5ec8d420ea362e1a13f43be77a9ec7930a18272b33
SHA5120d6f5e63a1b28ebb50db8a57512508bf3c985006de6d7eeeefa814d3f3bc6b75cb255ae086f216aca87175d3902ffb8b8530a73c4487caa8d52b991f4c51e6e9