Resubmissions
30-10-2023 21:04
231030-zwlmwafb7y 730-10-2023 21:03
231030-zwawdafb7w 730-10-2023 21:00
231030-zte3bahb57 730-10-2023 20:57
231030-zr3etsfb51 730-10-2023 20:19
231030-y38kjsfa31 7Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
30-10-2023 20:57
Behavioral task
behavioral1
Sample
snake_eaterII.exe
Resource
win7-20231025-en
General
-
Target
snake_eaterII.exe
-
Size
6.9MB
-
MD5
bf8992602fb929f15c856fa33b683153
-
SHA1
6fb6587d3e13c10381a873df89adaa759ad0e024
-
SHA256
803441e8f57b727a4eb403be2a4088b99b1877bb45a80de37e80df4442a1f8f7
-
SHA512
f8209489e95ac9df5c401865838e864a79397a3c97ac07bbaf0a98e8719b1547b99d7ee479b04e5501d2f57f6c927ef1f364b62b3c54d9be29b88f0f86f31ee4
-
SSDEEP
98304:Kak8YWQRkhUsdDwG1eFsr7/9YKPlcGxH0Ig17E3AAy5tx5KD/SSvzJT1aOcUoS:Kak9k6YDwGcs9VtcGfcY3gtA71Zc
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2588 snake_eaterII.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2588 2952 snake_eaterII.exe 29 PID 2952 wrote to memory of 2588 2952 snake_eaterII.exe 29 PID 2952 wrote to memory of 2588 2952 snake_eaterII.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\snake_eaterII.exe"C:\Users\Admin\AppData\Local\Temp\snake_eaterII.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\snake_eaterII.exe"C:\Users\Admin\AppData\Local\Temp\snake_eaterII.exe"2⤵
- Loads dropped DLL
PID:2588
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081