Analysis
-
max time kernel
105s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
Hesap hareketleriniz pdf.exe
Resource
win10v2004-20250314-en
General
-
Target
Hesap hareketleriniz pdf.exe
-
Size
1.1MB
-
MD5
79ed528abfa1bbea14e37e46618c8c62
-
SHA1
8c873717c85fc9e94b1b26194d5fb6c20f20de86
-
SHA256
6bce5b711926f8dcbec9c90407e6ad9e77761acf87bce8c548f065cfd46a503a
-
SHA512
3f57ff9a7ab58f8b66b18461b989dc0945f49fa472af8abdd3ba892a761db242ac3b3c5b2de0d7e67587306b53d9c11591d7fc8be6d031b39bc2304a0615e4b7
-
SSDEEP
24576:eE2Lq/a/MhtGOSaxqX6rrGY6ebr3UIb/S3N+t8Y014ux0:Ri/2QUAA/sma3NW64W0
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot7364470606:AAEcz2z8Dv2QVAXOs9nVEg5EakMwUvY5Ssw/sendMessage?chat_id=7969902771
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
resource yara_rule behavioral1/memory/5904-1357-0x0000000140000000-0x0000000140024000-memory.dmp family_snakekeylogger -
Snakekeylogger family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 312 created 3432 312 Hesap hareketleriniz pdf.exe 55 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TypeId.vbs Hesap hareketleriniz pdf.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 checkip.dyndns.org 21 reallyfreegeoip.org 22 reallyfreegeoip.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 312 set thread context of 5904 312 Hesap hareketleriniz pdf.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 312 Hesap hareketleriniz pdf.exe 5904 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 312 Hesap hareketleriniz pdf.exe Token: SeDebugPrivilege 312 Hesap hareketleriniz pdf.exe Token: SeDebugPrivilege 5904 InstallUtil.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 312 wrote to memory of 5904 312 Hesap hareketleriniz pdf.exe 88 PID 312 wrote to memory of 5904 312 Hesap hareketleriniz pdf.exe 88 PID 312 wrote to memory of 5904 312 Hesap hareketleriniz pdf.exe 88 PID 312 wrote to memory of 5904 312 Hesap hareketleriniz pdf.exe 88 PID 312 wrote to memory of 5904 312 Hesap hareketleriniz pdf.exe 88 PID 312 wrote to memory of 5904 312 Hesap hareketleriniz pdf.exe 88 PID 5904 wrote to memory of 4044 5904 InstallUtil.exe 90 PID 5904 wrote to memory of 4044 5904 InstallUtil.exe 90 PID 4044 wrote to memory of 4940 4044 cmd.exe 92 PID 4044 wrote to memory of 4940 4044 cmd.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz pdf.exe"C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz pdf.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:312
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5904 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 34⤵PID:4940
-
-
-