Resubmissions

01-10-2023 01:12

231001-bkkdnsgc41 10

01-10-2023 01:07

231001-bgtg6shf93 10

Analysis

  • max time kernel
    1801s
  • max time network
    1812s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2023 01:12

General

  • Target

    Snow Hub.exe

  • Size

    76.6MB

  • MD5

    8b393f90d4aef88f67e6d9661226cc00

  • SHA1

    ed8e5d59c24310c5dff598da6797fc7dc3c9642f

  • SHA256

    0241ac5112b4f0a5dc50a7dde3a34b2f96af15017571db04b466df6910d97691

  • SHA512

    1bc25afa98c830d94670a9a3b73db83bdd4870a3ecf0e318a6e75345742d69b95f649f1819cebd2b34f57c43100febf0f96a9e75f9f9ef26279a022620cdc97b

  • SSDEEP

    1572864:J2MTiQYHuSk8IpG7V+VPhqaAE7lftXHpPWc2Mp6SbOWNaUSBOUzq:JZTixOSkB05awaJJec2gnbOgaUSAUzq

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1416 --field-trial-handle=1208,i,1352840862602815095,10984995822095088863,131072 /prefetch:2
    1⤵
      PID:920
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3188 --field-trial-handle=1208,i,1352840862602815095,10984995822095088863,131072 /prefetch:8
      1⤵
        PID:1972
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --mojo-platform-channel-handle=3316 --field-trial-handle=1208,i,1352840862602815095,10984995822095088863,131072 /prefetch:1
        1⤵
          PID:2216
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3536 --field-trial-handle=1208,i,1352840862602815095,10984995822095088863,131072 /prefetch:8
          1⤵
            PID:1072
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3284 --field-trial-handle=1208,i,1352840862602815095,10984995822095088863,131072 /prefetch:8
            1⤵
              PID:2348
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3184 --field-trial-handle=1208,i,1352840862602815095,10984995822095088863,131072 /prefetch:8
              1⤵
                PID:3024
              • C:\Users\Admin\AppData\Local\Temp\Snow Hub.exe
                "C:\Users\Admin\AppData\Local\Temp\Snow Hub.exe"
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:1220
                • C:\Users\Admin\AppData\Local\Temp\Snow Hub.exe
                  "C:\Users\Admin\AppData\Local\Temp\Snow Hub.exe"
                  2⤵
                  • Loads dropped DLL
                  PID:2892
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4036 --field-trial-handle=1208,i,1352840862602815095,10984995822095088863,131072 /prefetch:8
                1⤵
                  PID:2724
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --mojo-platform-channel-handle=4124 --field-trial-handle=1208,i,1352840862602815095,10984995822095088863,131072 /prefetch:1
                  1⤵
                    PID:1136
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --mojo-platform-channel-handle=1988 --field-trial-handle=1208,i,1352840862602815095,10984995822095088863,131072 /prefetch:1
                    1⤵
                      PID:1600
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1208,i,1352840862602815095,10984995822095088863,131072 /prefetch:8
                      1⤵
                        PID:1648
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=3836 --field-trial-handle=1208,i,1352840862602815095,10984995822095088863,131072 /prefetch:1
                        1⤵
                          PID:2332
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=2044 --field-trial-handle=1208,i,1352840862602815095,10984995822095088863,131072 /prefetch:1
                          1⤵
                            PID:2192
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --mojo-platform-channel-handle=3696 --field-trial-handle=1208,i,1352840862602815095,10984995822095088863,131072 /prefetch:1
                            1⤵
                              PID:1072
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=1028 --field-trial-handle=1208,i,1352840862602815095,10984995822095088863,131072 /prefetch:1
                              1⤵
                                PID:1652

                              Network

                              MITRE ATT&CK Matrix

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Temp\_MEI12202\api-ms-win-core-file-l1-2-0.dll

                                Filesize

                                21KB

                                MD5

                                2b36752a5157359da1c0e646ee9bec45

                                SHA1

                                708aeb7e945c9c709109cea359cb31bd7ac64889

                                SHA256

                                3e3eb284937b572d1d70ce27be77b5e02eb73704c8b50feb5eb933db1facd2fc

                                SHA512

                                fc56080362506e3f38f1b3eb9d3193cdb9e576613c2e672f0fe9df203862f8a0f31938fa48b4ff7115dfe6016fa1fd5c5422fdc1913df63b3fde5f478a8417a1

                              • C:\Users\Admin\AppData\Local\Temp\_MEI12202\api-ms-win-core-file-l2-1-0.dll

                                Filesize

                                18KB

                                MD5

                                bfffa7117fd9b1622c66d949bac3f1d7

                                SHA1

                                402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

                                SHA256

                                1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

                                SHA512

                                b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

                              • C:\Users\Admin\AppData\Local\Temp\_MEI12202\api-ms-win-core-localization-l1-2-0.dll

                                Filesize

                                21KB

                                MD5

                                3589557535bba7641da3d76eefb0c73d

                                SHA1

                                6f63107c2212300c7cd1573059c08b43e5bd9b95

                                SHA256

                                642b01bb93d2cb529acf56070d65aae3202fd0b48d19fd40ec6763b627bcbee6

                                SHA512

                                7aedf3cf686b416f8b419f8af1d57675096ab2c2378c5a006f6ecbf2fe1ad701f28b7be8f08c9083230cf4d15d463371e92a6032178cd6c139d60b26fbd49b06

                              • C:\Users\Admin\AppData\Local\Temp\_MEI12202\api-ms-win-core-processthreads-l1-1-1.dll

                                Filesize

                                21KB

                                MD5

                                774aa9f9318880cb4ad3bf6f464da556

                                SHA1

                                3a5c07cf35009c98eb033e1cbde1900135d1abf8

                                SHA256

                                ba9fbd3a21879614c050c86a74ad2fffc0362266d6fa7be0ef359de393136346

                                SHA512

                                f7b57afb9810e3390d27a5469572fb29f0f1726f599403a180e685466237dff5dec4fdce40105ef1bb057e012d546308213e7cec73e0d7d3c5815eec8189a75d

                              • C:\Users\Admin\AppData\Local\Temp\_MEI12202\api-ms-win-core-timezone-l1-1-0.dll

                                Filesize

                                21KB

                                MD5

                                b9a20c9223d3e3d3a0c359f001ce1046

                                SHA1

                                9710b9a8c393ba00c254cf693c7c37990c447cc8

                                SHA256

                                00d9a7353be0a54c17e4862b86196a8b2bc6a007899fa2fbe61afd9765548068

                                SHA512

                                a7d5611c0b3b53da6cac61e0374d54d27e6e8a1af90ef66cd7e1b052f906c8b3f6087f4c6de0db3ae0b099df7689ecde6c815a954b728d36d9d3b5d002ccf18e

                              • C:\Users\Admin\AppData\Local\Temp\_MEI12202\python311.dll

                                Filesize

                                1.6MB

                                MD5

                                5792adeab1e4414e0129ce7a228eb8b8

                                SHA1

                                e9f022e687b6d88d20ee96d9509f82e916b9ee8c

                                SHA256

                                7e1370058177d78a415b7ed113cc15472974440d84267fc44cdc5729535e3967

                                SHA512

                                c8298b5780a2a5eebed070ac296eda6902b0cac9fda7bb70e21f482d6693d6d2631ca1ac4be96b75ac0dd50c9ca35be5d0aca9c4586ba7e58021edccd482958b

                              • C:\Users\Admin\AppData\Local\Temp\_MEI12202\ucrtbase.dll

                                Filesize

                                992KB

                                MD5

                                0e0bac3d1dcc1833eae4e3e4cf83c4ef

                                SHA1

                                4189f4459c54e69c6d3155a82524bda7549a75a6

                                SHA256

                                8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

                                SHA512

                                a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

                              • \Users\Admin\AppData\Local\Temp\_MEI12202\api-ms-win-core-file-l1-2-0.dll

                                Filesize

                                21KB

                                MD5

                                2b36752a5157359da1c0e646ee9bec45

                                SHA1

                                708aeb7e945c9c709109cea359cb31bd7ac64889

                                SHA256

                                3e3eb284937b572d1d70ce27be77b5e02eb73704c8b50feb5eb933db1facd2fc

                                SHA512

                                fc56080362506e3f38f1b3eb9d3193cdb9e576613c2e672f0fe9df203862f8a0f31938fa48b4ff7115dfe6016fa1fd5c5422fdc1913df63b3fde5f478a8417a1

                              • \Users\Admin\AppData\Local\Temp\_MEI12202\api-ms-win-core-file-l2-1-0.dll

                                Filesize

                                18KB

                                MD5

                                bfffa7117fd9b1622c66d949bac3f1d7

                                SHA1

                                402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

                                SHA256

                                1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

                                SHA512

                                b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

                              • \Users\Admin\AppData\Local\Temp\_MEI12202\api-ms-win-core-localization-l1-2-0.dll

                                Filesize

                                21KB

                                MD5

                                3589557535bba7641da3d76eefb0c73d

                                SHA1

                                6f63107c2212300c7cd1573059c08b43e5bd9b95

                                SHA256

                                642b01bb93d2cb529acf56070d65aae3202fd0b48d19fd40ec6763b627bcbee6

                                SHA512

                                7aedf3cf686b416f8b419f8af1d57675096ab2c2378c5a006f6ecbf2fe1ad701f28b7be8f08c9083230cf4d15d463371e92a6032178cd6c139d60b26fbd49b06

                              • \Users\Admin\AppData\Local\Temp\_MEI12202\api-ms-win-core-processthreads-l1-1-1.dll

                                Filesize

                                21KB

                                MD5

                                774aa9f9318880cb4ad3bf6f464da556

                                SHA1

                                3a5c07cf35009c98eb033e1cbde1900135d1abf8

                                SHA256

                                ba9fbd3a21879614c050c86a74ad2fffc0362266d6fa7be0ef359de393136346

                                SHA512

                                f7b57afb9810e3390d27a5469572fb29f0f1726f599403a180e685466237dff5dec4fdce40105ef1bb057e012d546308213e7cec73e0d7d3c5815eec8189a75d

                              • \Users\Admin\AppData\Local\Temp\_MEI12202\api-ms-win-core-timezone-l1-1-0.dll

                                Filesize

                                21KB

                                MD5

                                b9a20c9223d3e3d3a0c359f001ce1046

                                SHA1

                                9710b9a8c393ba00c254cf693c7c37990c447cc8

                                SHA256

                                00d9a7353be0a54c17e4862b86196a8b2bc6a007899fa2fbe61afd9765548068

                                SHA512

                                a7d5611c0b3b53da6cac61e0374d54d27e6e8a1af90ef66cd7e1b052f906c8b3f6087f4c6de0db3ae0b099df7689ecde6c815a954b728d36d9d3b5d002ccf18e

                              • \Users\Admin\AppData\Local\Temp\_MEI12202\python311.dll

                                Filesize

                                1.6MB

                                MD5

                                5792adeab1e4414e0129ce7a228eb8b8

                                SHA1

                                e9f022e687b6d88d20ee96d9509f82e916b9ee8c

                                SHA256

                                7e1370058177d78a415b7ed113cc15472974440d84267fc44cdc5729535e3967

                                SHA512

                                c8298b5780a2a5eebed070ac296eda6902b0cac9fda7bb70e21f482d6693d6d2631ca1ac4be96b75ac0dd50c9ca35be5d0aca9c4586ba7e58021edccd482958b

                              • \Users\Admin\AppData\Local\Temp\_MEI12202\ucrtbase.dll

                                Filesize

                                992KB

                                MD5

                                0e0bac3d1dcc1833eae4e3e4cf83c4ef

                                SHA1

                                4189f4459c54e69c6d3155a82524bda7549a75a6

                                SHA256

                                8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

                                SHA512

                                a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

                              • memory/2892-1302-0x000007FEF3FC0000-0x000007FEF45A9000-memory.dmp

                                Filesize

                                5.9MB