Analysis

  • max time kernel
    137s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 09:10

General

  • Target

    ATTACHED COPY..docx

  • Size

    16KB

  • MD5

    10c774db881a877ea4c25b62d754b77a

  • SHA1

    fea962e22d25df7d72b3121c60c7820e7ac84a92

  • SHA256

    d1c19d7d9e7c1d0d192b7cef272688627f19dd965627a342a450fc15c18ac477

  • SHA512

    c9b530730243a869e25f77219cc62789cb4ce1b9efb9ebc1834f2738502a5fd0652825860d3b39ffe16c2b1f2b2448d4a6b1d0277eb591e34acedf42d3fb89e0

  • SSDEEP

    384:gyXc0x2WXYs8PL8wi4OEwH8TIbE91r2fRcJYLvi/ma/nvnx:gccd/5P3DOqnYJaKvama/p

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.artefes.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ArtEfes4765*+

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 5 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ATTACHED COPY..docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3000
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Users\Admin\AppData\Roaming\obi29386.scr
        "C:\Users\Admin\AppData\Roaming\obi29386.scr"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1264
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\obi29386.scr"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2912
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\OVuuEmvQvW.exe"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1604
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OVuuEmvQvW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp58FD.tmp"
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2444
        • C:\Users\Admin\AppData\Roaming\obi29386.scr
          "C:\Users\Admin\AppData\Roaming\obi29386.scr"
          3⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:1396

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Command and Scripting Interpreter

    1
    T1059

    PowerShell

    1
    T1059.001

    Exploitation for Client Execution

    1
    T1203

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Persistence

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Privilege Escalation

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Defense Evasion

    Modify Registry

    2
    T1112

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Credential Access

    Unsecured Credentials

    2
    T1552

    Credentials In Files

    2
    T1552.001

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    2
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      1KB

      MD5

      4596a1ad2e5831c7bec2b825ffabf060

      SHA1

      351de001d1233e2f0d611b305cf5f6295ebc797b

      SHA256

      7391f1d61d21219aeec7d39544465f5feb331125da623b421fd537b453d8a044

      SHA512

      4fe95744e5396ed422501cdab484bb97e7c55307448b734f9bfbee06173c91ab9649127546d777ce579a94ad3a15194c6df1ae9935ecd938f840ccbf6a455a93

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
      Filesize

      724B

      MD5

      8202a1cd02e7d69597995cabbe881a12

      SHA1

      8858d9d934b7aa9330ee73de6c476acf19929ff6

      SHA256

      58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

      SHA512

      97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      410B

      MD5

      ba92097a477332780791e0bb2d55d5a5

      SHA1

      181f47b750a1833772843afeb94b09a47fd2c659

      SHA256

      fbc9886e36641c71feee603bf65d9547b835ac6ec1342c893179e2d1fd142f6c

      SHA512

      d02e35f1c81b70b269d71b657666c4ce6ebc3ff58cdd66469588b4ee19b6ac7968473b06d9518748db07953671ad7bfee6331a44224c4d0df1fcf72b46d0e331

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      4864bf68507d931ecc75f324f0235857

      SHA1

      c673376b7b20e533bf94bb90fc8626eeb7d36133

      SHA256

      77ba2643c98fd9d000a1da13f112d5db421d6dd5abf710d865e87d5f21befa63

      SHA512

      cc3fead09a7dddc69b40efb71f86f3bfae44a73b5b133d5eab1966b84b79279559e4d1d36a8ade19a3098eb538f64979445df3b5a07c831153ecbcbb14cd1cdf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
      Filesize

      392B

      MD5

      f8aa489bdc21b3134322a8cbceb6a6a5

      SHA1

      69d70133d4dc04348916c0a1e4ff98f5fa65d6c3

      SHA256

      0bc1078bcac94d2105147fb21967c969997494a2c8f9056763ff13278562511d

      SHA512

      fa7c6bda70d79bba6a26ec5cc842a131dd30b1478d78598f9188639f6a6527ad33c7cddb3a368eca042b05a2aa8b79d2476e6f492cd0a123cfaa0fb4635f54f9

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      49b6fd1105f4b50c9b8b6579bb16859d

      SHA1

      7e41a0a5b4708e86f1ab53c71bf3c14fe447983d

      SHA256

      5875a2563c7f78c18cf75dd1c9ae54ecd93d694c25c6ce4e9333979e8e603aff

      SHA512

      a2347a0e0c9da27dbd859602e5ad15845a5f3bda91a2d8f70206faa90416f81e4ff25f165587d9ad42b18d32c1790b3a4a10f9779f0fe2dab28fddee4183dc8b

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      6184a7144725e1a301cdb1c2986bb128

      SHA1

      7345578a0d6707f5b15047ffa8ef80ad90c1cb8c

      SHA256

      b17dead4231d88397bf8216f63af4a7bd5694450856f89f25fda683f0da8b2aa

      SHA512

      00644bf2b7225a8f9dce7c280536466a4b85ab0bbd3298c0fc0abc789b7cb99aecb2efe5e03b95582a375db02c2e8bb44a74aef5243a0d3025b5f872a9b865be

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\528EVS6A\obii[1].doc
      Filesize

      512KB

      MD5

      868f7a288d5983e777dbc21f99630f94

      SHA1

      1a8566852e9e5794a2497afdc457e3700d44c16f

      SHA256

      bfbacb1dd06af7af969aed0b22d3b1015001025c56cb578f07a9f98149703a73

      SHA512

      b56821bb5d07997265d82b1747bf6e6fc5a763bb92dcd4e9156f0b710ef1447382350a8a0128670e53085b91ea2ed5eb91dff10f0d6363bb36a3f132379d60b1

    • C:\Users\Admin\AppData\Local\Temp\Cab2961.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar2D0A.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\Tar2E29.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\tmp58FD.tmp
      Filesize

      1KB

      MD5

      cbedd67b8c6690ee32a30367eacf6d25

      SHA1

      8be93c946c284e3cbef853947ed6dc720617be47

      SHA256

      baf6373b0a1ac19099bd5d37709ae2a13e1040b5adff141595a7ff6525998b8e

      SHA512

      018c5794ece30172bad5bae4b4da5d06966a5dcd670d5ac2715e40aee4b2a92ce04285b3b9b70cd1fa8cac0176f9880e21dfb69a9272f0c96cccdda661d1a961

    • C:\Users\Admin\AppData\Local\Temp\{2C885BAD-669A-45E7-A713-702FD9C6F9DF}
      Filesize

      128KB

      MD5

      9a765df097e933d7faa911447eb1231c

      SHA1

      6910fc38b0f55bb60190e6b7b88d27816d18fa04

      SHA256

      eace71fcc40d6571b3450b697ed89605ccd90147a7c1dcfd86f05f0c75ce5783

      SHA512

      42b2639cbab557371399fa3898ec179a0a7c32c0fa1767a82abaada79269f2874577f09475bf49c811c1691839d114c73a6b672cf52d7a7d74d7c2a27d04c9ae

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      Filesize

      7KB

      MD5

      84fd01e7efa01a8a63bd3e5595d323fb

      SHA1

      695e430a8a99398278ab2c8ab8d8effe1a4c4d73

      SHA256

      b207b3d254b6d2f13beca0461b11819c0951e8c7cf3863061875dee7fe5bdfd9

      SHA512

      c86e515521be194301e1b655ca33a14e96ce45b2f9ff0f5d1caad8388343e9efce5af6b2d6d40a0092add49245073582a45fa40bd4f378edd891147b48d1df83

    • \Users\Admin\AppData\Roaming\obi29386.scr
      Filesize

      590KB

      MD5

      696fec829c8e91759367752610fb5068

      SHA1

      281845ae9c6955672533775f2e261950514c1eb6

      SHA256

      ed7209f074b895a067f683da2438c9ee2c4f6aa912b82778600a98724888eeb5

      SHA512

      13e637ce5554b9738d1738d74ca0509fd3985844fb9768c7d4fb2c4fbef800c86bc70a5be631fdd82835c7877eca3d376c0b83be9eed9b482d2e9899caf61c11

    • memory/1264-237-0x00000000068D0000-0x0000000006938000-memory.dmp
      Filesize

      416KB

    • memory/1264-225-0x00000000005C0000-0x00000000005D0000-memory.dmp
      Filesize

      64KB

    • memory/1264-122-0x0000000001070000-0x0000000001106000-memory.dmp
      Filesize

      600KB

    • memory/1264-236-0x00000000007B0000-0x00000000007BC000-memory.dmp
      Filesize

      48KB

    • memory/1396-252-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/1396-259-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/1396-250-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/1396-261-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/1396-254-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/1396-258-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/1396-262-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/1396-256-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/1740-263-0x00000000710DD000-0x00000000710E8000-memory.dmp
      Filesize

      44KB

    • memory/1740-2-0x00000000710DD000-0x00000000710E8000-memory.dmp
      Filesize

      44KB

    • memory/1740-0-0x000000002F741000-0x000000002F742000-memory.dmp
      Filesize

      4KB

    • memory/1740-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB