Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 02:04

General

  • Target

    ATTACHED COPY..docx

  • Size

    16KB

  • MD5

    10c774db881a877ea4c25b62d754b77a

  • SHA1

    fea962e22d25df7d72b3121c60c7820e7ac84a92

  • SHA256

    d1c19d7d9e7c1d0d192b7cef272688627f19dd965627a342a450fc15c18ac477

  • SHA512

    c9b530730243a869e25f77219cc62789cb4ce1b9efb9ebc1834f2738502a5fd0652825860d3b39ffe16c2b1f2b2448d4a6b1d0277eb591e34acedf42d3fb89e0

  • SSDEEP

    384:gyXc0x2WXYs8PL8wi4OEwH8TIbE91r2fRcJYLvi/ma/nvnx:gccd/5P3DOqnYJaKvama/p

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.artefes.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ArtEfes4765*+

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 5 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ATTACHED COPY..docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2464
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Users\Admin\AppData\Roaming\obi29386.scr
        "C:\Users\Admin\AppData\Roaming\obi29386.scr"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\obi29386.scr"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1720
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\NwwiCWz.exe"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2796
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NwwiCWz" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5B10.tmp"
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2896
        • C:\Users\Admin\AppData\Roaming\obi29386.scr
          "C:\Users\Admin\AppData\Roaming\obi29386.scr"
          3⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:2560

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Command and Scripting Interpreter

    1
    T1059

    PowerShell

    1
    T1059.001

    Exploitation for Client Execution

    1
    T1203

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Persistence

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Privilege Escalation

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Defense Evasion

    Modify Registry

    2
    T1112

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Credential Access

    Unsecured Credentials

    2
    T1552

    Credentials In Files

    2
    T1552.001

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    2
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      1KB

      MD5

      7a472466c53443d1863cc13409680ef0

      SHA1

      2db0b0bb4edf5190a504d87a7f91d4556767b0eb

      SHA256

      7dd7707cac518be281aa7a6cc2ddbfeae6c35197c4a6bf2664466c0d19bf3b32

      SHA512

      699a087d612a729f71a09042e94ca4ce68703cca12e86a2cda3a2f71950d1f14978fd49cf0a9d7e8b268b3ae4757be4cf8a76c936951ca132a910f02249b2046

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
      Filesize

      724B

      MD5

      8202a1cd02e7d69597995cabbe881a12

      SHA1

      8858d9d934b7aa9330ee73de6c476acf19929ff6

      SHA256

      58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

      SHA512

      97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      410B

      MD5

      b289dd785c9425bb4ac269aeb37cf06a

      SHA1

      a7b7275b100cba6f9d119c7c5e0497624340e5df

      SHA256

      55167343afc3e2832be6e9f3858b871285844fafd2938c51796d2cd18eacb15a

      SHA512

      e2f394674e5de215cfb80a41c2a96176322f10fca07c1a42dbf4b215a7746d687b0c7f94e4d544910b998bd0bab9fe3591ac485d8fc6299fa84c0b8fa1a41cfb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      68bf703eae2a8bc65e7cc67083269429

      SHA1

      b38695dde228560976d457d1ddac3e00bc432970

      SHA256

      9632744d0c3852780b94aef6659fbb4bf41316f1df0937ebe8b107b4c8d1bb6e

      SHA512

      7a6d2889f8c177e61dc80612ee8093d8561c76ceb5837c1324c528553c71302cc5f048d0d665e993e286dd87122e840ef48d24698ed5bcd4d6944457b1b50dca

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
      Filesize

      392B

      MD5

      3b9d5707bf425c67bc45aabbbc9fdcd4

      SHA1

      063f7c29379096fad044f4d356f04aca205be0cd

      SHA256

      c5285572e56dd30265bb57968de50f3a37bef893ab67f1f57ac3ecba9be955e6

      SHA512

      934efd0cc7f885fd5e808dc56b23b60847ef3db798555695ff778db63fde456294f8ccdb149c6896758fda82ab6574048bf99a25f734c5cc489c59147fc6f3b2

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{9E42E22A-4C24-4E1C-A80B-C745E56257B4}.FSD
      Filesize

      128KB

      MD5

      6a8e7a5dc367ea8340f79d4be43c9607

      SHA1

      036d3f4d5329775d800461563629e590d90314cf

      SHA256

      379056313bea0eed131982d9301c692b8c01e3823b445728cce6cc3ecff30148

      SHA512

      d223d155e0d0720e7b7bc884a06644ad6184ce930f5d84045cc57e49c052ffedbf5f53e7b1a80e0bf0afc5146de19e05c9aaa626af443cb0357691187ede94ed

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      006ae13e1e4acccf873eaf81ae537ff4

      SHA1

      391efad63af12c62f59630a4500852c0cee7d61d

      SHA256

      f50215f4c9f47182332fe3be520bdb80e1c00fc876a2717e92d6f535509c078c

      SHA512

      e78c6e56eb63a8a5b9980cec325fc6bf0533164cb985889048fe709c0225def57f1f4d6310db20e599f581333a4ec53279d8ce8b74e28e4de7a3d832bfa828d4

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{A361CCA1-97EC-483C-A9F7-DCE939C3F5F0}.FSD
      Filesize

      128KB

      MD5

      8c4a789985663dee7d9e8f72908681f1

      SHA1

      f83e2a5290c7630be1859c277c712e5172fb8cd4

      SHA256

      25ab939ee48d80a34b178943cac5966fb2389271247a02e088e8ea8f84c44df7

      SHA512

      69f3cd8b482547c1956070f58e4eae4779b3b324448a597e5bbfde1b408877e0a81001bc1603c3746f167f75fae2ca59408ed8f6090e1a2194c91e8a2ed35566

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\528EVS6A\obii[1].doc
      Filesize

      512KB

      MD5

      868f7a288d5983e777dbc21f99630f94

      SHA1

      1a8566852e9e5794a2497afdc457e3700d44c16f

      SHA256

      bfbacb1dd06af7af969aed0b22d3b1015001025c56cb578f07a9f98149703a73

      SHA512

      b56821bb5d07997265d82b1747bf6e6fc5a763bb92dcd4e9156f0b710ef1447382350a8a0128670e53085b91ea2ed5eb91dff10f0d6363bb36a3f132379d60b1

    • C:\Users\Admin\AppData\Local\Temp\Cab2839.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar2C11.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\Tar30B8.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\tmp5B10.tmp
      Filesize

      1KB

      MD5

      adaa9bfc27cc43a906fa5299cd3adb9f

      SHA1

      47e6310e446dfcdd6f50019bf6008ac9d8eab50d

      SHA256

      fad0d532d47b86087fff02fdef16dd796acbdb5dbf1b598241127a3381f77dfd

      SHA512

      ee7c9acfdb6f3a6cc1c0df3a63e9004ed1957f6d6f8b2423ee2a92a86b12c9e92dddf8be2b36b82b8b3e2858c67e7ac85efdcaad60a7d34a568b894f752c6c05

    • C:\Users\Admin\AppData\Local\Temp\{AD4430AF-F4DB-47CB-891D-D37079DEFE06}
      Filesize

      128KB

      MD5

      7211fb7be8b29adcededdf22eae1bba3

      SHA1

      1ba595b75417ce27158ac63541ed1e56181924a6

      SHA256

      2fc97e580457301663c1073aed9851cf9646d1da4f81f5804c021a5d4bd39010

      SHA512

      ae8ff4d02678ed804c4bbbb35c7858d8fd99b942ccd3202b5bad5e3d0abe3a3a22a4d28156db82eff72bde7b009baaa627f036742995a8f19eb8a63447d264b5

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      29e0ffee18ec426baea7addef5917326

      SHA1

      022ceae027adb2b8009faea2bf6604b8b279992b

      SHA256

      3e339576db9b8c2e28e74da7154195dee8240a559dd1618217cfada9aabb1820

      SHA512

      028287b0d37270092ad6c8f2f67afaf1d1746df4c1308b70d26f88175759fba3d5e413da0bcaddb7f9e042720e19258bdad84763f6f8fe5eba641b684ff4405a

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6LC0TYDECSPZIAZ5AHYD.temp
      Filesize

      7KB

      MD5

      a0a39e5af88fb3c97d7864eb7fc65e05

      SHA1

      bb8740db3078cc2aaab61905a5080fd11975c43a

      SHA256

      cf68809416f1daa05dbe1c9258d4c15a5d13ac683bc2a144abd1e3cbcaa7683f

      SHA512

      b916320fb1f16ef59547f223871951b3d7499fe5138a6c0bcbf9c824d49e2208592f610f6af7d25ce70be9a5489cb301418990df64c522d66f4bbcc2184f4a94

    • \Users\Admin\AppData\Roaming\obi29386.scr
      Filesize

      588KB

      MD5

      c1eedf3ba4f503e6649bca9ab5b4780f

      SHA1

      a0f9723e89487fd5ef2e305178814ad54b8bb319

      SHA256

      2ae74498a4bc05fa360233342c3652e7df4dc830e240e500ede97931a11e856e

      SHA512

      fe9add3112d842ea1992e0ef9a9f42cb393c2eee7bc274c53a27a3518856701eee0d194900d2f289a369b43a5237d38aaca2403e3de3619bcb13961b20237a65

    • memory/2436-288-0x0000000071A1D000-0x0000000071A28000-memory.dmp
      Filesize

      44KB

    • memory/2436-2-0x0000000071A1D000-0x0000000071A28000-memory.dmp
      Filesize

      44KB

    • memory/2436-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2436-0-0x000000002F0D1000-0x000000002F0D2000-memory.dmp
      Filesize

      4KB

    • memory/2436-287-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2436-263-0x0000000071A1D000-0x0000000071A28000-memory.dmp
      Filesize

      44KB

    • memory/2560-250-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/2560-252-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/2560-262-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/2560-261-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/2560-259-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/2560-258-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/2560-256-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/2560-254-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/2584-237-0x0000000005CD0000-0x0000000005D38000-memory.dmp
      Filesize

      416KB

    • memory/2584-236-0x0000000001180000-0x000000000118C000-memory.dmp
      Filesize

      48KB

    • memory/2584-234-0x0000000000BD0000-0x0000000000BE0000-memory.dmp
      Filesize

      64KB

    • memory/2584-122-0x0000000001190000-0x0000000001226000-memory.dmp
      Filesize

      600KB