Analysis
-
max time kernel
73s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 17:37
Behavioral task
behavioral1
Sample
snake_eater.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
snake_eater.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
snake_eater.pyc
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
snake_eater.pyc
Resource
win10v2004-20230915-en
General
-
Target
snake_eater.pyc
-
Size
7KB
-
MD5
c8bf7509904761a4317f33ed6118b3fa
-
SHA1
990bd77939ed4c65ad1a1f51beae195e82bdac52
-
SHA256
a89e7144b5a6100011da10f352e11778c1dc08374629378a9f6d40425c921014
-
SHA512
6f3e946e54417f7b926e451a328e4c7c8cfa1399576dd507dd1e736483c8d377608bd05320ed803b3bb4a50d3e7d573bb66f8dcaa0658ecbb8ef2cb37362f649
-
SSDEEP
192:dXY/v+kIQWHh/GtyfQK1Eg5baP5939BJX7JLcLL1lm:dXGgVdGtyfh1Eg5baP5h93rMHm
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2804 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2804 1896 cmd.exe 29 PID 1896 wrote to memory of 2804 1896 cmd.exe 29 PID 1896 wrote to memory of 2804 1896 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\snake_eater.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\snake_eater.pyc2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2804
-