Windows
Analysis Report
PO-2513203-PDF.js
Overview
General Information
Detection
Snake Keylogger, VIP Keylogger
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
JScript performs obfuscated calls to suspicious functions
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
JavaScript source code contains functionality to generate code involving HTTP requests or file downloads
JavaScript source code contains functionality to generate code involving a shell, file or stream
Potential obfuscated javascript found
Powershell drops PE file
Sample uses string decryption to hide its real strings
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to detect virtual machines (SGDT)
Contains functionality to detect virtual machines (SIDT)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
wscript.exe (PID: 7272 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\PO-25 13203-PDF. js" MD5: A47CBE969EA935BDD3AB568BB126BC80) powershell.exe (PID: 7912 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -NoProfile -Executio nPolicy Re moteSigned -File "C: \Temp\WTRT RWFSHS.ps1 " MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7920 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
404 Keylogger, Snake Keylogger | Snake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram. | No Attribution |
{"Exfil Mode": "Telegram", "Bot Token": "7692968455:AAFUd6DDUCm9bBSVBpp5I0Oudm0YDdn6C3o", "Chat id": "6163418482"}
{"Exfil Mode": "Telegram", "Token": "7692968455:AAFUd6DDUCm9bBSVBpp5I0Oudm0YDdn6C3o", "Chat_id": "6163418482", "Version": "4.4"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_VIPKeylogger | Yara detected VIP Keylogger | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_VIPKeylogger | Yara detected VIP Keylogger | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
Click to see the 22 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_VIPKeylogger | Yara detected VIP Keylogger | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth |
| |
Click to see the 29 entries |
System Summary |
---|
Source: | Author: frack113, Florian Roth: |
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: frack113: |
Source: | Author: Michael Haag: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-13T10:21:58.364550+0100 | 2018856 | 1 | A Network Trojan was detected | 176.65.144.3 | 80 | 192.168.2.4 | 49717 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-13T10:22:10.588743+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49727 | 104.21.112.1 | 443 | TCP |
2025-03-13T10:22:13.480604+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49729 | 104.21.112.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-13T10:22:05.613647+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49725 | 132.226.247.73 | 80 | TCP |
2025-03-13T10:22:08.301188+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49725 | 132.226.247.73 | 80 | TCP |
2025-03-13T10:22:11.332437+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49728 | 132.226.247.73 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-13T10:22:34.700827+0100 | 1810007 | 1 | Potentially Bad Traffic | 192.168.2.4 | 49742 | 149.154.167.220 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Avira: | ||
Source: | Avira: |
Source: | Malware Configuration Extractor: | ||
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Location Tracking |
---|
Source: | DNS query: |
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: |
Software Vulnerabilities |
---|
Source: | Return value : | Go to definition | ||
Source: | Return value : | Go to definition | ||
Source: | Return value : | Go to definition | ||
Source: | Return value : | Go to definition | ||
Source: | Return value : | Go to definition | ||
Source: | Argument value : | Go to definition | ||
Source: | Return value : | Go to definition | ||
Source: | Return value : | Go to definition |
Source: | Child: |
Source: | Code function: | 10_2_00E94688 | |
Source: | Code function: | 10_2_00E94688 | |
Source: | Code function: | 11_2_00ECF2C0 | |
Source: | Code function: | 11_2_00ECF4AC | |
Source: | Code function: | 11_2_00ECF52F | |
Source: | Code function: | 11_2_00ECF960 | |
Source: | Code function: | 11_2_06842A90 | |
Source: | Code function: | 11_2_06842EF0 | |
Source: | Code function: | 11_2_0684DAC8 | |
Source: | Code function: | 11_2_06842EE7 | |
Source: | Code function: | 11_2_0684D218 | |
Source: | Code function: | 11_2_06843236 | |
Source: | Code function: | 11_2_0684D670 | |
Source: | Code function: | 11_2_06840673 | |
Source: | Code function: | 11_2_0684E7D0 | |
Source: | Code function: | 11_2_0684DF20 | |
Source: | Code function: | 11_2_06840B30 | |
Source: | Code function: | 11_2_06840B30 | |
Source: | Code function: | 11_2_0684E378 | |
Source: | Code function: | 11_2_0684F080 | |
Source: | Code function: | 11_2_0684F4D8 | |
Source: | Code function: | 11_2_0684EC28 | |
Source: | Code function: | 11_2_06840040 | |
Source: | Code function: | 11_2_06840853 | |
Source: | Code function: | 11_2_0684CDC0 | |
Source: | Code function: | 11_2_0684F930 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | Network Connect: | Jump to behavior |
Source: | Argument value : | Go to definition | ||
Source: | Argument value : | Go to definition | ||
Source: | Return value : | Go to definition | ||
Source: | Return value : | Go to definition | ||
Source: | Argument value : | Go to definition | ||
Source: | Return value : | Go to definition | ||
Source: | Argument value : | Go to definition | ||
Source: | Return value : | Go to definition | ||
Source: | Return value : | Go to definition | ||
Source: | Return value : | Go to definition | ||
Source: | Return value : | Go to definition | ||
Source: | Argument value : | Go to definition | ||
Source: | Argument value : | Go to definition | ||
Source: | Argument value : | Go to definition | ||
Source: | Return value : | Go to definition |
Source: | DNS query: |
Source: | HTTP traffic detected: |