Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 16:57

General

  • Target

    28062024_1657_28062024_ATTACHED COPY.docx

  • Size

    16KB

  • MD5

    10c774db881a877ea4c25b62d754b77a

  • SHA1

    fea962e22d25df7d72b3121c60c7820e7ac84a92

  • SHA256

    d1c19d7d9e7c1d0d192b7cef272688627f19dd965627a342a450fc15c18ac477

  • SHA512

    c9b530730243a869e25f77219cc62789cb4ce1b9efb9ebc1834f2738502a5fd0652825860d3b39ffe16c2b1f2b2448d4a6b1d0277eb591e34acedf42d3fb89e0

  • SSDEEP

    384:gyXc0x2WXYs8PL8wi4OEwH8TIbE91r2fRcJYLvi/ma/nvnx:gccd/5P3DOqnYJaKvama/p

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.artefes.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ArtEfes4765*+

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 5 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\28062024_1657_28062024_ATTACHED COPY.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1936
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Users\Admin\AppData\Roaming\obi29386.scr
        "C:\Users\Admin\AppData\Roaming\obi29386.scr"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:896
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\obi29386.scr"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3064
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\OVuuEmvQvW.exe"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          PID:2512
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OVuuEmvQvW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp54C9.tmp"
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1732
        • C:\Users\Admin\AppData\Roaming\obi29386.scr
          "C:\Users\Admin\AppData\Roaming\obi29386.scr"
          3⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:2876

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Command and Scripting Interpreter

    1
    T1059

    PowerShell

    1
    T1059.001

    Exploitation for Client Execution

    1
    T1203

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Persistence

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Privilege Escalation

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Defense Evasion

    Modify Registry

    2
    T1112

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Credential Access

    Unsecured Credentials

    2
    T1552

    Credentials In Files

    2
    T1552.001

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    2
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      1KB

      MD5

      2d389126d4570830cb2a739b3c95ad17

      SHA1

      3db3a885f0564d7c817bbe82a4f32c45b9aa0575

      SHA256

      ae42fe481e86e6851e1c3824af21a29b9db53ad4aae3e452db39bfed6bdfa3d5

      SHA512

      68008c95642d171465ae374f0055e83c3f2c327923140fab1725c0471fe10d158a4cbf7237ba30aa83aa32f9d2299c1abff180393c91ef045367d7a43d202bfa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
      Filesize

      724B

      MD5

      8202a1cd02e7d69597995cabbe881a12

      SHA1

      8858d9d934b7aa9330ee73de6c476acf19929ff6

      SHA256

      58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

      SHA512

      97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      410B

      MD5

      955cfa4e93fbed3d096e573370a2593c

      SHA1

      d5650a076ecaa28324cd436095e82e87d31a1813

      SHA256

      cdc8806225f71575471a581a9f14c4e0e1659ab2e6c1a09d5ed35d62de6d68bc

      SHA512

      15835ccf9274bc857d571eb3b563864b14e82f8f3405c9d2217b088fbd582bddc93b39a0d7f3418bdda7e0643fdc50425a0db3811464e66da3eb627112c80d4b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ba719595e86e98768d91e218326222e1

      SHA1

      0ceb2dbcb93ec809ab1e154638bcfe905c1f440d

      SHA256

      c6bbfa05aafe1188549db385449cc0638d242fd50c2a994b2650ddeb72459598

      SHA512

      1e107d938749c33e53cc93cf61602acfa02bd9cb5048cabded19e638d6055158652013ef7f9b5b88f447b2cdd057f5c248b846bd0e0635af60ffea85ae70b3b7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
      Filesize

      392B

      MD5

      344c18479e4edc5455179ac254c56694

      SHA1

      2b8be031ce8036afc5e0271caf55efd9c4372428

      SHA256

      3c089d1d6427890173fa5b0228573e67c242100717093dfd9d0d8c3c6851d1d8

      SHA512

      61cf74e5fcc194c2364d22973631a4f1c618c86df6cd04b7c233882e40c33d94ef796c6a8be64c31603b135d6ea873d8f4295b9c73fa8910663f3291e52e4554

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{CC73B6B3-C5BF-4DA8-946D-2FDA0C37F518}.FSD
      Filesize

      128KB

      MD5

      5c03848ecc22f5f13b7c411c35201935

      SHA1

      6a03527787082cb13da583c0a564a2376ace7ad9

      SHA256

      0ca1072f0c1deadeef74a77d76403d9e26fb7331d105ca99117e42428b80a17c

      SHA512

      e5f56c96906038a59379583829119e5baafde1aceccb32103993bbda098f4da3ecad9c7e1acf8185355245f2dacb1ec8069f6750756e4dd9497270c289601a99

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      0f7a16d2e4cda36201f8af24a008beb9

      SHA1

      0f0eb3ce78882f920e3196f0f695e749f0894ae7

      SHA256

      c8c7251df09ea3c9d32a79e4191556d75b77112c38a8bd29caaea31c04b7e804

      SHA512

      37683a7a8dc3c1ef4db32701677b866f0beb7fabad5d5d381d37578278f7821c419f590b4ec79cc6b078ff2ca91cb8de418b2804c599eb5af59bd21ca0677f09

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FY3LN490\obii[1].doc
      Filesize

      512KB

      MD5

      868f7a288d5983e777dbc21f99630f94

      SHA1

      1a8566852e9e5794a2497afdc457e3700d44c16f

      SHA256

      bfbacb1dd06af7af969aed0b22d3b1015001025c56cb578f07a9f98149703a73

      SHA512

      b56821bb5d07997265d82b1747bf6e6fc5a763bb92dcd4e9156f0b710ef1447382350a8a0128670e53085b91ea2ed5eb91dff10f0d6363bb36a3f132379d60b1

    • C:\Users\Admin\AppData\Local\Temp\Cab21B4.tmp
      Filesize

      67KB

      MD5

      2d3dcf90f6c99f47e7593ea250c9e749

      SHA1

      51be82be4a272669983313565b4940d4b1385237

      SHA256

      8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4

      SHA512

      9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

    • C:\Users\Admin\AppData\Local\Temp\Tar27F0.tmp
      Filesize

      160KB

      MD5

      7186ad693b8ad9444401bd9bcd2217c2

      SHA1

      5c28ca10a650f6026b0df4737078fa4197f3bac1

      SHA256

      9a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed

      SHA512

      135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b

    • C:\Users\Admin\AppData\Local\Temp\tmp54C9.tmp
      Filesize

      1KB

      MD5

      423c3e07a7371a63fd03823b6b5ab20d

      SHA1

      5f76512ea2d1c619e0f0990385608b7546956be5

      SHA256

      822ec3130008f06d875808c54f27724c562a0cd458f45dc8383d974872e35da7

      SHA512

      b61ae775276c3d2b6aef519e298cba573569d597593d4697c6d9cfd4ddaf847b88daec9372e0cfeaa3e696f5905d9b3f63e494acd36e99dcdc25514d733b7c50

    • C:\Users\Admin\AppData\Local\Temp\{FF728174-3F1C-4DC2-A546-A53233E281D6}
      Filesize

      128KB

      MD5

      c48b0d07b01386bb79899cf7101be3d7

      SHA1

      3ac833dd54aab5da38fa802b86273f2bf8b9faae

      SHA256

      2fbf497e3da707c1a29ffa180b50b402fb9795578e8f5ea9bfb417cd1f2b9974

      SHA512

      99b9f2d7a0c6970033d845a73aa459b268e82152a5196bb925f1de86a7968d09f17e7e7c3e8d59cb0afd2ddc0f44ce3adcf1943e4504c1b4a1f1c8b8a2ce6ff3

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
      Filesize

      54B

      MD5

      53b4832d76ef73a3d1ad1bc34d46bcbb

      SHA1

      bf22742b2fae66dcd6c059e32dd1069cba6c0a90

      SHA256

      e9cca2415871fd65668a6c572691d5a0b4243aefb8529ddfcf31fe33ce3abe57

      SHA512

      9b09548c93c990eb58b8d006e65acd1a60a3e0b19e4b805d788be4dd7ca9137d4825d45a0e5cf6ba078e8ba7712053ca3a384036a926dea509a15448ae15de98

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      b49347226f95592e3b1e37dde003f47b

      SHA1

      83de5dbdc1ef5ffde3f838ba50ca5eab9615d92f

      SHA256

      d800a9f26f193df481781b81934dc9a2a6ccb673afdd163c5d7d349f2775ef04

      SHA512

      3831b171c145724f4a28f69b3afdc33116945ce5014070f65d8e4676df2e1daf4a407dcef338ced2322d30528ad8d5b0af2700c287249910b4149f2258320d21

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • \Users\Admin\AppData\Roaming\obi29386.scr
      Filesize

      590KB

      MD5

      696fec829c8e91759367752610fb5068

      SHA1

      281845ae9c6955672533775f2e261950514c1eb6

      SHA256

      ed7209f074b895a067f683da2438c9ee2c4f6aa912b82778600a98724888eeb5

      SHA512

      13e637ce5554b9738d1738d74ca0509fd3985844fb9768c7d4fb2c4fbef800c86bc70a5be631fdd82835c7877eca3d376c0b83be9eed9b482d2e9899caf61c11

    • memory/896-121-0x0000000000190000-0x0000000000226000-memory.dmp
      Filesize

      600KB

    • memory/896-204-0x0000000000750000-0x0000000000760000-memory.dmp
      Filesize

      64KB

    • memory/896-215-0x0000000002030000-0x000000000203C000-memory.dmp
      Filesize

      48KB

    • memory/896-216-0x0000000006620000-0x0000000006688000-memory.dmp
      Filesize

      416KB

    • memory/1212-0-0x000000002F9F1000-0x000000002F9F2000-memory.dmp
      Filesize

      4KB

    • memory/1212-2-0x000000007189D000-0x00000000718A8000-memory.dmp
      Filesize

      44KB

    • memory/1212-269-0x000000007189D000-0x00000000718A8000-memory.dmp
      Filesize

      44KB

    • memory/1212-268-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1212-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1212-244-0x000000007189D000-0x00000000718A8000-memory.dmp
      Filesize

      44KB

    • memory/2512-241-0x00000000637E0000-0x000000006380F000-memory.dmp
      Filesize

      188KB

    • memory/2512-242-0x0000000063770000-0x00000000637D1000-memory.dmp
      Filesize

      388KB

    • memory/2876-230-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/2876-228-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/2876-224-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/2876-232-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/2876-233-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/2876-235-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/2876-237-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/2876-226-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB