Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
lista de cotizaciones.xlam.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
lista de cotizaciones.xlam.exe
Resource
win10v2004-20240508-en
General
-
Target
lista de cotizaciones.xlam.exe
-
Size
984KB
-
MD5
3397f79c3a08077e9295c17c9b3b938c
-
SHA1
7c1cfd2b56e5f4780b561942fe1e9f62200be5cb
-
SHA256
fc53ccd71a8b45f03e842e375777e017b73371d2ae6828af9fd8328f6b91c3ee
-
SHA512
a651cd572e27869b1c2901aea00244a08fe7b2607422d7b97892e9ef9e86a1fcce29ad9b86904fa6bd8c30bf2e9fe97f4df002a89acebbf9085218a41e1e1a81
-
SSDEEP
24576:fAHnh+eWsN3skA4RV1Hom2KXMmHanbuQ5:Ch+ZkldoPK8YanZ
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5581840526:AAE1o2MXOklfCJKspnGyHbkaYvwtJlJ8h3M/sendMessage?chat_id=5063375086
Signatures
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2616-11-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 checkip.dyndns.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
lista de cotizaciones.xlam.exedescription pid process target process PID 5112 set thread context of 2616 5112 lista de cotizaciones.xlam.exe RegSvcs.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4560 2616 WerFault.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
RegSvcs.exepid process 2616 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
lista de cotizaciones.xlam.exepid process 5112 lista de cotizaciones.xlam.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 2616 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
lista de cotizaciones.xlam.exepid process 5112 lista de cotizaciones.xlam.exe 5112 lista de cotizaciones.xlam.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
lista de cotizaciones.xlam.exepid process 5112 lista de cotizaciones.xlam.exe 5112 lista de cotizaciones.xlam.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
lista de cotizaciones.xlam.exedescription pid process target process PID 5112 wrote to memory of 2616 5112 lista de cotizaciones.xlam.exe RegSvcs.exe PID 5112 wrote to memory of 2616 5112 lista de cotizaciones.xlam.exe RegSvcs.exe PID 5112 wrote to memory of 2616 5112 lista de cotizaciones.xlam.exe RegSvcs.exe PID 5112 wrote to memory of 2616 5112 lista de cotizaciones.xlam.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\lista de cotizaciones.xlam.exe"C:\Users\Admin\AppData\Local\Temp\lista de cotizaciones.xlam.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\lista de cotizaciones.xlam.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 14243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 2616 -ip 26161⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2616-11-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/2616-12-0x0000000073D0E000-0x0000000073D0F000-memory.dmpFilesize
4KB
-
memory/2616-13-0x0000000005D70000-0x0000000006314000-memory.dmpFilesize
5.6MB
-
memory/2616-14-0x00000000056F0000-0x000000000578C000-memory.dmpFilesize
624KB
-
memory/2616-15-0x0000000073D00000-0x00000000744B0000-memory.dmpFilesize
7.7MB
-
memory/2616-16-0x0000000073D00000-0x00000000744B0000-memory.dmpFilesize
7.7MB
-
memory/5112-10-0x00000000012E0000-0x00000000012E4000-memory.dmpFilesize
16KB