Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11-06-2024 02:02

General

  • Target

    snss2.exe

  • Size

    7.7MB

  • MD5

    3a856193d7f5204896257205ffbe19bf

  • SHA1

    a9f0f06ca0828076b76edd913e5c8429d7bb2ca3

  • SHA256

    8ab04f749508030f388cbbe218bfaf32490673793c066d4e1002b6ad56f78c1e

  • SHA512

    0d3a2468f130e1431e7ef57f0021e14ecc91399addf6f6648cb689d45bd162f0f3a9931807aa4c69e341a3e49bbe63a9c04dbc841cfc7c4b36c023f7e114b63a

  • SSDEEP

    98304:3RjBDuX7yiW2cTYuVEWilcAiKS6m4goQ1v5zzG1GM2h8LH7Bil63eAo3YLhQL7IC:3R1D1iQT3fnIGMZ7Bil63r6YLEurIvZf

Malware Config

Signatures

  • Detects HijackLoader (aka IDAT Loader) 1 IoCs
  • HijackLoader

    HijackLoader is a multistage loader first seen in 2023.

  • Deletes itself 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\snss2.exe
    "C:\Users\Admin\AppData\Local\Temp\snss2.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\SysWOW64\cmd.exe
      2⤵
      • Deletes itself
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
          PID:2812

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ba4d6a52
      Filesize

      1.0MB

      MD5

      64f29d62f12699ee74adca5ea634176f

      SHA1

      2fb4be6127fbd6ff646e7a99ab644099a842f02d

      SHA256

      59d042ec666f92635555b72640a1cb105baec0b0b7e7b57bb225dcdd2ab05019

      SHA512

      71254dd236c068197f7e3f355f1d7c641b26ba47bed73ef531be03b920a85b13264ab8de6b246f6ba959f69395d7ebac74fde0d2c20b8c843167ac9133b9954c

    • memory/2400-1-0x0000000074B90000-0x0000000074D04000-memory.dmp
      Filesize

      1.5MB

    • memory/2400-3-0x0000000074BA2000-0x0000000074BA4000-memory.dmp
      Filesize

      8KB

    • memory/2400-4-0x0000000074B90000-0x0000000074D04000-memory.dmp
      Filesize

      1.5MB

    • memory/2400-2-0x0000000077A60000-0x0000000077C09000-memory.dmp
      Filesize

      1.7MB

    • memory/2400-7-0x0000000074B90000-0x0000000074D04000-memory.dmp
      Filesize

      1.5MB

    • memory/2400-0-0x0000000000400000-0x0000000000BFE000-memory.dmp
      Filesize

      8.0MB

    • memory/2812-15-0x0000000000400000-0x000000000046F000-memory.dmp
      Filesize

      444KB

    • memory/2812-16-0x0000000077A60000-0x0000000077C09000-memory.dmp
      Filesize

      1.7MB

    • memory/2812-17-0x0000000000400000-0x000000000046F000-memory.dmp
      Filesize

      444KB

    • memory/2812-19-0x0000000000C00000-0x0000000000C08000-memory.dmp
      Filesize

      32KB

    • memory/2812-20-0x0000000000400000-0x000000000046F000-memory.dmp
      Filesize

      444KB

    • memory/2896-10-0x0000000077A60000-0x0000000077C09000-memory.dmp
      Filesize

      1.7MB

    • memory/2896-11-0x0000000074B90000-0x0000000074D04000-memory.dmp
      Filesize

      1.5MB

    • memory/2896-12-0x0000000074B90000-0x0000000074D04000-memory.dmp
      Filesize

      1.5MB

    • memory/2896-14-0x0000000074B90000-0x0000000074D04000-memory.dmp
      Filesize

      1.5MB

    • memory/2896-8-0x0000000074B90000-0x0000000074D04000-memory.dmp
      Filesize

      1.5MB