Analysis
-
max time kernel
141s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2023 15:36
Behavioral task
behavioral1
Sample
snake_eater.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
snake_eater.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
snake_eater.pyc
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
snake_eater.pyc
Resource
win10v2004-20231020-en
General
-
Target
snake_eater.pyc
-
Size
7KB
-
MD5
c8bf7509904761a4317f33ed6118b3fa
-
SHA1
990bd77939ed4c65ad1a1f51beae195e82bdac52
-
SHA256
a89e7144b5a6100011da10f352e11778c1dc08374629378a9f6d40425c921014
-
SHA512
6f3e946e54417f7b926e451a328e4c7c8cfa1399576dd507dd1e736483c8d377608bd05320ed803b3bb4a50d3e7d573bb66f8dcaa0658ecbb8ef2cb37362f649
-
SSDEEP
192:dXY/v+kIQWHh/GtyfQK1Eg5baP5939BJX7JLcLL1lm:dXGgVdGtyfh1Eg5baP5h93rMHm
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-568313063-1441237985-1542345083-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1920 OpenWith.exe