Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 07:28
Static task
static1
Behavioral task
behavioral1
Sample
motech24062024.pdf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
motech24062024.pdf.exe
Resource
win10v2004-20240508-en
General
-
Target
motech24062024.pdf.exe
-
Size
535KB
-
MD5
902b1157277ecbe3917b85fa905e7f4d
-
SHA1
6dbb38742564c4f64718e60e5efed146b30b0c83
-
SHA256
982ce45e891648e586e05d172a32580a141d52a7861dd4afdeebfc20777dcbb3
-
SHA512
71ef622ca4c59a1ec548cd21f09c40d4c6356a75158dbe54008596988d8bc6ee15926012d2cb97a57f5dbad22f3dadbf5d6f234199e3240edb3814d6fa7f746b
-
SSDEEP
6144:fx3JWzvWtGwhhvISKQjDNSfZilVj4G5MNklWJ8u//z8K8ICFw7JwHOevcKX3frqg:f3mmhAv4qAlMSMRF8s7yHJv/v+2LuSn
Malware Config
Extracted
snakekeylogger
Protocol: smtp- Host:
mail.mastersharks.com - Port:
587 - Username:
[email protected] - Password:
=)!5e%+IUZ$q0bJM - Email To:
[email protected]
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2904-14-0x0000000000080000-0x00000000000A6000-memory.dmp family_snakekeylogger behavioral1/memory/2904-21-0x0000000000080000-0x00000000000A6000-memory.dmp family_snakekeylogger behavioral1/memory/2904-18-0x0000000000080000-0x00000000000A6000-memory.dmp family_snakekeylogger behavioral1/memory/2904-13-0x0000000000080000-0x00000000000A6000-memory.dmp family_snakekeylogger behavioral1/memory/2904-8-0x0000000000080000-0x00000000000A6000-memory.dmp family_snakekeylogger behavioral1/memory/2904-9-0x0000000000080000-0x00000000000A6000-memory.dmp family_snakekeylogger -
Suspicious use of SetThreadContext 1 IoCs
Processes:
motech24062024.pdf.exedescription pid process target process PID 1960 set thread context of 2904 1960 motech24062024.pdf.exe motech24062024.pdf.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2556 2904 WerFault.exe motech24062024.pdf.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
motech24062024.pdf.exepid process 2904 motech24062024.pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
motech24062024.pdf.exedescription pid process Token: SeDebugPrivilege 2904 motech24062024.pdf.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
motech24062024.pdf.exemotech24062024.pdf.exedescription pid process target process PID 1960 wrote to memory of 2904 1960 motech24062024.pdf.exe motech24062024.pdf.exe PID 1960 wrote to memory of 2904 1960 motech24062024.pdf.exe motech24062024.pdf.exe PID 1960 wrote to memory of 2904 1960 motech24062024.pdf.exe motech24062024.pdf.exe PID 1960 wrote to memory of 2904 1960 motech24062024.pdf.exe motech24062024.pdf.exe PID 1960 wrote to memory of 2904 1960 motech24062024.pdf.exe motech24062024.pdf.exe PID 1960 wrote to memory of 2904 1960 motech24062024.pdf.exe motech24062024.pdf.exe PID 1960 wrote to memory of 2904 1960 motech24062024.pdf.exe motech24062024.pdf.exe PID 1960 wrote to memory of 2904 1960 motech24062024.pdf.exe motech24062024.pdf.exe PID 1960 wrote to memory of 2904 1960 motech24062024.pdf.exe motech24062024.pdf.exe PID 2904 wrote to memory of 2556 2904 motech24062024.pdf.exe WerFault.exe PID 2904 wrote to memory of 2556 2904 motech24062024.pdf.exe WerFault.exe PID 2904 wrote to memory of 2556 2904 motech24062024.pdf.exe WerFault.exe PID 2904 wrote to memory of 2556 2904 motech24062024.pdf.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\motech24062024.pdf.exe"C:\Users\Admin\AppData\Local\Temp\motech24062024.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\motech24062024.pdf.exe"C:\Users\Admin\AppData\Local\Temp\motech24062024.pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 5563⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1960-0-0x0000000074C2E000-0x0000000074C2F000-memory.dmpFilesize
4KB
-
memory/1960-1-0x0000000000250000-0x00000000002DC000-memory.dmpFilesize
560KB
-
memory/1960-2-0x0000000000360000-0x00000000003B4000-memory.dmpFilesize
336KB
-
memory/1960-3-0x0000000074C20000-0x000000007530E000-memory.dmpFilesize
6.9MB
-
memory/1960-4-0x0000000000330000-0x0000000000338000-memory.dmpFilesize
32KB
-
memory/1960-23-0x0000000074C20000-0x000000007530E000-memory.dmpFilesize
6.9MB
-
memory/2904-18-0x0000000000080000-0x00000000000A6000-memory.dmpFilesize
152KB
-
memory/2904-21-0x0000000000080000-0x00000000000A6000-memory.dmpFilesize
152KB
-
memory/2904-14-0x0000000000080000-0x00000000000A6000-memory.dmpFilesize
152KB
-
memory/2904-13-0x0000000000080000-0x00000000000A6000-memory.dmpFilesize
152KB
-
memory/2904-8-0x0000000000080000-0x00000000000A6000-memory.dmpFilesize
152KB
-
memory/2904-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2904-9-0x0000000000080000-0x00000000000A6000-memory.dmpFilesize
152KB
-
memory/2904-7-0x0000000000080000-0x00000000000A6000-memory.dmpFilesize
152KB
-
memory/2904-22-0x0000000074C20000-0x000000007530E000-memory.dmpFilesize
6.9MB
-
memory/2904-5-0x0000000000080000-0x00000000000A6000-memory.dmpFilesize
152KB
-
memory/2904-24-0x0000000074C20000-0x000000007530E000-memory.dmpFilesize
6.9MB