Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 16:54
Behavioral task
behavioral1
Sample
snake_eater.exe
Resource
win7-20230831-en
General
-
Target
snake_eater.exe
-
Size
6.9MB
-
MD5
52eaabffa4a20fecb4c50a937e720e7d
-
SHA1
e5869e376e230d8c5b0f7181ac19f191895c30b4
-
SHA256
dd042c46ccab1eef92c289498b7825694a6aab6e04a093b2244b126af01c01fa
-
SHA512
31f3cd78fbb74e351f80dc09cac4d7355b0d0f688613a99574f8b104ef51050e57b3c03dbb22c6ab8d4be679df951257111a5190ab111a4b9787dd2228c2184a
-
SSDEEP
98304:+aC8fWQRkhUsdDwG1eFsr7/9YuPlcGxH0Ig17E3AAy5tx5KD/SSvzJT1aOcUoS:+aCYk6YDwGcs9jtcGfcY3gtA71Zc
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2608 snake_eater.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2608 2076 snake_eater.exe 29 PID 2076 wrote to memory of 2608 2076 snake_eater.exe 29 PID 2076 wrote to memory of 2608 2076 snake_eater.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\snake_eater.exe"C:\Users\Admin\AppData\Local\Temp\snake_eater.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\snake_eater.exe"C:\Users\Admin\AppData\Local\Temp\snake_eater.exe"2⤵
- Loads dropped DLL
PID:2608
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2488
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081