Analysis
-
max time kernel
140s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-03_6924d2cdc36e0992b763bc4679052793_snatch.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-03_6924d2cdc36e0992b763bc4679052793_snatch.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-03_6924d2cdc36e0992b763bc4679052793_snatch.exe
-
Size
8.1MB
-
MD5
6924d2cdc36e0992b763bc4679052793
-
SHA1
e3689890f2f9ba156a03a5ee4352cf77c7d59fe6
-
SHA256
d035b8af9ef110e3c7fab1bf7844345e13b14c3187b084ac4f78c52d79fe5664
-
SHA512
b0aeefd9d4c3297d45d682d88119770d007c4d013fd8ddc35381bb2056c00916e66f93f631b508d2cfa0976fc3364c7654d8622876e87013cc537faec4b7484b
-
SSDEEP
98304:JfCx+J+myJPe88J0wFD1UNI4F10gCfpSECKDIQdH+Pfk+tvTNXKFgPFpr1+0Q/:R2I4FGgCfprCeIQdHW5DXe2pr1+
Malware Config
Signatures
-
pid Process 2092 powershell.exe 4532 powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2092 powershell.exe 2092 powershell.exe 4532 powershell.exe 4532 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2092 powershell.exe Token: SeDebugPrivilege 4532 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 208 wrote to memory of 2092 208 2024-05-03_6924d2cdc36e0992b763bc4679052793_snatch.exe 85 PID 208 wrote to memory of 2092 208 2024-05-03_6924d2cdc36e0992b763bc4679052793_snatch.exe 85 PID 208 wrote to memory of 2092 208 2024-05-03_6924d2cdc36e0992b763bc4679052793_snatch.exe 85 PID 208 wrote to memory of 4532 208 2024-05-03_6924d2cdc36e0992b763bc4679052793_snatch.exe 91 PID 208 wrote to memory of 4532 208 2024-05-03_6924d2cdc36e0992b763bc4679052793_snatch.exe 91 PID 208 wrote to memory of 4532 208 2024-05-03_6924d2cdc36e0992b763bc4679052793_snatch.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-03_6924d2cdc36e0992b763bc4679052793_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-03_6924d2cdc36e0992b763bc4679052793_snatch.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NonInteractive "(Get-AppxPackage | Where-Object -Property Name -Eq \"SpotifyAB.SpotifyMusic\").InstallLocation"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NonInteractive "(Get-AppxPackage | Where-Object -Property Name -Eq \"SpotifyAB.SpotifyMusic\").InstallLocation"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD595201d9e44c732d9b261b4b334505d6b
SHA1d5f3f499ef27920d8a614152191a7e0c2f9c0264
SHA256baa9a89717f4013b2799bd06490c738246759ecdf7a3200406fad5a443e83669
SHA51215ddf637b642144dca99e2794cb4ca4d1dfa9d682e7eb42075d9b269dd5a479b5ea86017db142b599a3f022ebb695baf3691305ab17009060b4f64ddd7254282
-
Filesize
17KB
MD58d412dc57dbff39af282733a035d1e39
SHA1be933a96f238c99a04fa9bebfeee0c63f2296da5
SHA256b8408ff2b9f1ef903552a2052c47130b82d745a41be13d2c9607b9bb62aa5999
SHA512e2c1aa68633069dbb2a01bdb5f4de995570b453ead69e34bf94df390cdaeb34361ad7d9a9239af6bee4de0fabe43f4e34b1ed74fb1f2c63b6caaa179169ac63f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82