Analysis

  • max time kernel
    136s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2025, 07:19

General

  • Target

    Narudbenica130666ImpolTlm_pdf.scr

  • Size

    12KB

  • MD5

    8b858788092ce0a0a4c774712bf99089

  • SHA1

    d0363773fdbfa6718325af55dac0a91f0ff01a0d

  • SHA256

    511c7c20def507f2498d9bb941173990602dcbe9b45399d424c232fca3aa318e

  • SHA512

    693876604cfaf457ee3e81a507b35e8a7dbab469754140b17a2a2b68b28c5e71dc02ef3b17044d4e5a17bc2eea922c8201133ced0afc9abaa235640275d8169d

  • SSDEEP

    384:9X+ZBkUfh6g3CnMb4RHaPSqsDhVLEJ89M5niUug:96kUYG4RHcSXDhVLEJ1i2

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7016021549:AAFFED6mrzzYMktPd78AMWdi_nAN7SC1JJY/sendMessage?chat_id=1018401531

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3476
      • C:\Users\Admin\AppData\Local\Temp\Narudbenica130666ImpolTlm_pdf.scr
        "C:\Users\Admin\AppData\Local\Temp\Narudbenica130666ImpolTlm_pdf.scr" /S
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2568
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:5504

    Network

    MITRE ATT&CK Enterprise v16

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2568-0-0x00007FFE5C6D3000-0x00007FFE5C6D5000-memory.dmp

      Filesize

      8KB

    • memory/2568-1-0x0000025A3EA00000-0x0000025A3EA06000-memory.dmp

      Filesize

      24KB

    • memory/2568-2-0x00007FFE5C6D0000-0x00007FFE5D191000-memory.dmp

      Filesize

      10.8MB

    • memory/2568-3-0x00007FFE5C6D3000-0x00007FFE5C6D5000-memory.dmp

      Filesize

      8KB

    • memory/2568-4-0x0000025A59070000-0x0000025A5917A000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-12-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-22-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-56-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-68-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-66-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-112-0x00007FFE5C6D0000-0x00007FFE5D191000-memory.dmp

      Filesize

      10.8MB

    • memory/2568-64-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-62-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-60-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-58-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-54-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-52-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-50-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-46-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-44-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-42-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-40-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-38-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-36-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-34-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-30-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-28-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-24-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-20-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-18-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-17-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-14-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-10-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-8-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-6-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-48-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-32-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-26-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-5-0x0000025A59070000-0x0000025A59174000-memory.dmp

      Filesize

      1.0MB

    • memory/2568-1342-0x00007FFE5C6D0000-0x00007FFE5D191000-memory.dmp

      Filesize

      10.8MB

    • memory/2568-1343-0x0000025A5A430000-0x0000025A5A492000-memory.dmp

      Filesize

      392KB

    • memory/2568-1344-0x0000025A5A490000-0x0000025A5A4F0000-memory.dmp

      Filesize

      384KB

    • memory/2568-1345-0x0000025A5A5A0000-0x0000025A5A5EC000-memory.dmp

      Filesize

      304KB

    • memory/2568-1346-0x00007FFE5C6D0000-0x00007FFE5D191000-memory.dmp

      Filesize

      10.8MB

    • memory/2568-1347-0x00007FFE5C6D0000-0x00007FFE5D191000-memory.dmp

      Filesize

      10.8MB

    • memory/2568-1348-0x00007FFE5C6D0000-0x00007FFE5D191000-memory.dmp

      Filesize

      10.8MB

    • memory/2568-1349-0x00007FFE5C6D0000-0x00007FFE5D191000-memory.dmp

      Filesize

      10.8MB

    • memory/2568-1350-0x0000025A5A5F0000-0x0000025A5A644000-memory.dmp

      Filesize

      336KB

    • memory/2568-1355-0x00007FFE5C6D0000-0x00007FFE5D191000-memory.dmp

      Filesize

      10.8MB

    • memory/2568-1357-0x00007FFE5C6D0000-0x00007FFE5D191000-memory.dmp

      Filesize

      10.8MB

    • memory/2568-1359-0x00007FFE5C6D0000-0x00007FFE5D191000-memory.dmp

      Filesize

      10.8MB

    • memory/5504-1358-0x0000000140000000-0x0000000140024000-memory.dmp

      Filesize

      144KB

    • memory/5504-1360-0x00007FFE5C6D0000-0x00007FFE5D191000-memory.dmp

      Filesize

      10.8MB

    • memory/5504-1361-0x00007FFE5C6D0000-0x00007FFE5D191000-memory.dmp

      Filesize

      10.8MB

    • memory/5504-1362-0x00000118EB720000-0x00000118EB770000-memory.dmp

      Filesize

      320KB

    • memory/5504-1363-0x00000118EC310000-0x00000118EC4D2000-memory.dmp

      Filesize

      1.8MB