Analysis

  • max time kernel
    105s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2025, 18:12

General

  • Target

    Hesap hareketleriniz pdf.exe

  • Size

    1.1MB

  • MD5

    79ed528abfa1bbea14e37e46618c8c62

  • SHA1

    8c873717c85fc9e94b1b26194d5fb6c20f20de86

  • SHA256

    6bce5b711926f8dcbec9c90407e6ad9e77761acf87bce8c548f065cfd46a503a

  • SHA512

    3f57ff9a7ab58f8b66b18461b989dc0945f49fa472af8abdd3ba892a761db242ac3b3c5b2de0d7e67587306b53d9c11591d7fc8be6d031b39bc2304a0615e4b7

  • SSDEEP

    24576:eE2Lq/a/MhtGOSaxqX6rrGY6ebr3UIb/S3N+t8Y014ux0:Ri/2QUAA/sma3NW64W0

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7364470606:AAEcz2z8Dv2QVAXOs9nVEg5EakMwUvY5Ssw/sendMessage?chat_id=7969902771

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Drops startup file 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3432
      • C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\Hesap hareketleriniz pdf.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops startup file
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:312
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5904
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4044
          • C:\Windows\system32\choice.exe
            choice /C Y /N /D Y /T 3
            4⤵
              PID:4940

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/312-0-0x00007FFC647D3000-0x00007FFC647D5000-memory.dmp

        Filesize

        8KB

      • memory/312-1-0x0000028969E30000-0x0000028969F54000-memory.dmp

        Filesize

        1.1MB

      • memory/312-2-0x000002896C420000-0x000002896C52A000-memory.dmp

        Filesize

        1.0MB

      • memory/312-42-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-32-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-56-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-62-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-66-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-60-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-58-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-54-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-52-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-50-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-48-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-46-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-44-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-40-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-38-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-36-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-34-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-30-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-29-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-26-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-25-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-23-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-20-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-16-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-14-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-12-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-10-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-8-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-4-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-64-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-3-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-18-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-7-0x000002896C420000-0x000002896C524000-memory.dmp

        Filesize

        1.0MB

      • memory/312-1339-0x00007FFC647D0000-0x00007FFC65291000-memory.dmp

        Filesize

        10.8MB

      • memory/312-1340-0x00007FFC647D0000-0x00007FFC65291000-memory.dmp

        Filesize

        10.8MB

      • memory/312-1341-0x000002896BB20000-0x000002896BB82000-memory.dmp

        Filesize

        392KB

      • memory/312-1342-0x000002896C630000-0x000002896C690000-memory.dmp

        Filesize

        384KB

      • memory/312-1343-0x000002896C690000-0x000002896C6DC000-memory.dmp

        Filesize

        304KB

      • memory/312-1344-0x00007FFC647D0000-0x00007FFC65291000-memory.dmp

        Filesize

        10.8MB

      • memory/312-1345-0x00007FFC647D0000-0x00007FFC65291000-memory.dmp

        Filesize

        10.8MB

      • memory/312-1346-0x000002896C6E0000-0x000002896C734000-memory.dmp

        Filesize

        336KB

      • memory/312-1353-0x00007FFC647D0000-0x00007FFC65291000-memory.dmp

        Filesize

        10.8MB

      • memory/312-1355-0x00007FFC647D0000-0x00007FFC65291000-memory.dmp

        Filesize

        10.8MB

      • memory/312-1356-0x00007FFC647D0000-0x00007FFC65291000-memory.dmp

        Filesize

        10.8MB

      • memory/5904-1357-0x0000000140000000-0x0000000140024000-memory.dmp

        Filesize

        144KB

      • memory/5904-1358-0x00007FFC647D0000-0x00007FFC65291000-memory.dmp

        Filesize

        10.8MB

      • memory/5904-1359-0x00007FFC647D0000-0x00007FFC65291000-memory.dmp

        Filesize

        10.8MB

      • memory/5904-1361-0x00007FFC647D0000-0x00007FFC65291000-memory.dmp

        Filesize

        10.8MB