Static task
static1
Behavioral task
behavioral1
Sample
2024-06-04_f2a5d7d1006d754651f165f7526f628d_snatch.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-04_f2a5d7d1006d754651f165f7526f628d_snatch.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-04_f2a5d7d1006d754651f165f7526f628d_snatch
-
Size
15.2MB
-
MD5
f2a5d7d1006d754651f165f7526f628d
-
SHA1
650ca13371fd548d4f74139ce188b86eb35deeca
-
SHA256
7a42af982bfdfa34771275c8bbe7ff283b118898989b41f10f72803ea79c6d67
-
SHA512
1ffb7a9ce7d81720c3b70348b6274c7593bd10fc1b399357e4e2cd870f37d1cbd48a4c23963be8c627a1a10cb168d8a603c061f01724fc4c40291350f131ff13
-
SSDEEP
196608:YjF6l55aPUoRK3xUe6qten/TGAar+wYx:Y052FRK3d6qiLdg
Malware Config
Signatures
-
Detects executables referencing virtualization MAC addresses 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-04_f2a5d7d1006d754651f165f7526f628d_snatch
Files
-
2024-06-04_f2a5d7d1006d754651f165f7526f628d_snatch.exe windows:6 windows x64 arch:x64
9cbefe68f395e67356e2a5d8d1b285c0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
WriteFile
WriteConsoleW
WaitForMultipleObjects
WaitForSingleObject
VirtualQuery
VirtualFree
VirtualAlloc
SwitchToThread
SuspendThread
SetWaitableTimer
SetUnhandledExceptionFilter
SetProcessPriorityBoost
SetEvent
SetErrorMode
SetConsoleCtrlHandler
ResumeThread
PostQueuedCompletionStatus
LoadLibraryA
LoadLibraryW
SetThreadContext
GetThreadContext
GetSystemInfo
GetSystemDirectoryA
GetStdHandle
GetQueuedCompletionStatusEx
GetProcessAffinityMask
GetProcAddress
GetEnvironmentStringsW
GetConsoleMode
FreeEnvironmentStringsW
ExitProcess
DuplicateHandle
CreateWaitableTimerExW
CreateThread
CreateIoCompletionPort
CreateFileA
CreateEventA
CloseHandle
AddVectoredExceptionHandler
Sections
.text Size: 4.9MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5.2MB - Virtual size: 5.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 444KB - Virtual size: 8.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/4 Size: 512B - Virtual size: 295B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/19 Size: 798KB - Virtual size: 797KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/32 Size: 174KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/46 Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/65 Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/78 Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/90 Size: 269KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.symtab Size: 894KB - Virtual size: 894KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ