Analysis
-
max time kernel
29s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 10:14
Behavioral task
behavioral1
Sample
snake_eater.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
snake_eater.exe
Resource
win10v2004-20230915-en
General
-
Target
snake_eater.exe
-
Size
6.9MB
-
MD5
52eaabffa4a20fecb4c50a937e720e7d
-
SHA1
e5869e376e230d8c5b0f7181ac19f191895c30b4
-
SHA256
dd042c46ccab1eef92c289498b7825694a6aab6e04a093b2244b126af01c01fa
-
SHA512
31f3cd78fbb74e351f80dc09cac4d7355b0d0f688613a99574f8b104ef51050e57b3c03dbb22c6ab8d4be679df951257111a5190ab111a4b9787dd2228c2184a
-
SSDEEP
98304:+aC8fWQRkhUsdDwG1eFsr7/9YuPlcGxH0Ig17E3AAy5tx5KD/SSvzJT1aOcUoS:+aCYk6YDwGcs9jtcGfcY3gtA71Zc
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1236 wrote to memory of 3704 1236 snake_eater.exe 88 PID 1236 wrote to memory of 3704 1236 snake_eater.exe 88
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD541500cbdc925942c3a7dbd4a96aea990
SHA1af59fb73ac1aaf22bb4c028923591248fa4ed751
SHA256d0d27ad0df0e1c0721e8270f0c30c8a9fe802fd573ac78a0c744e856448642a3
SHA512811f542436db93581908d67691174200b38887d6e4397c13dfbe715430f83413079aa8f71985a63b91d9c8169b3c8c8f249f7ebf96b6cdb9d86c55e2e5001b90