Analysis
-
max time kernel
235s -
max time network
240s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 02:02
Behavioral task
behavioral1
Sample
snss2.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
snss2.exe
Resource
win10v2004-20240508-en
General
-
Target
snss2.exe
-
Size
7.7MB
-
MD5
3a856193d7f5204896257205ffbe19bf
-
SHA1
a9f0f06ca0828076b76edd913e5c8429d7bb2ca3
-
SHA256
8ab04f749508030f388cbbe218bfaf32490673793c066d4e1002b6ad56f78c1e
-
SHA512
0d3a2468f130e1431e7ef57f0021e14ecc91399addf6f6648cb689d45bd162f0f3a9931807aa4c69e341a3e49bbe63a9c04dbc841cfc7c4b36c023f7e114b63a
-
SSDEEP
98304:3RjBDuX7yiW2cTYuVEWilcAiKS6m4goQ1v5zzG1GM2h8LH7Bil63eAo3YLhQL7IC:3R1D1iQT3fnIGMZ7Bil63r6YLEurIvZf
Malware Config
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
resource yara_rule behavioral2/memory/1348-0-0x0000000000400000-0x0000000000BFE000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1200 created 3032 1200 explorer.exe 51 -
Deletes itself 1 IoCs
pid Process 3412 cmd.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1348 set thread context of 3412 1348 snss2.exe 92 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1348 snss2.exe 1348 snss2.exe 3412 cmd.exe 3412 cmd.exe 1200 explorer.exe 1200 explorer.exe 3564 dialer.exe 3564 dialer.exe 3564 dialer.exe 3564 dialer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1348 snss2.exe 3412 cmd.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1348 wrote to memory of 3412 1348 snss2.exe 92 PID 1348 wrote to memory of 3412 1348 snss2.exe 92 PID 1348 wrote to memory of 3412 1348 snss2.exe 92 PID 1348 wrote to memory of 3412 1348 snss2.exe 92 PID 3412 wrote to memory of 1200 3412 cmd.exe 96 PID 3412 wrote to memory of 1200 3412 cmd.exe 96 PID 3412 wrote to memory of 1200 3412 cmd.exe 96 PID 3412 wrote to memory of 1200 3412 cmd.exe 96 PID 1200 wrote to memory of 3564 1200 explorer.exe 99 PID 1200 wrote to memory of 3564 1200 explorer.exe 99 PID 1200 wrote to memory of 3564 1200 explorer.exe 99 PID 1200 wrote to memory of 3564 1200 explorer.exe 99 PID 1200 wrote to memory of 3564 1200 explorer.exe 99
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3032
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3564
-
-
C:\Users\Admin\AppData\Local\Temp\snss2.exe"C:\Users\Admin\AppData\Local\Temp\snss2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1200
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3748,i,14221647728265121051,6840906015709541562,262144 --variations-seed-version --mojo-platform-channel-handle=3976 /prefetch:81⤵PID:940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD55b7479749c294430b0a5096164ececcb
SHA15d7af2ecbc336d3ca0360683c75dd278a3c474ed
SHA25608a72b5d08619666a9f3026ce52aa0da9eccec3e75c5c1bb2c48a1a5a352aab9
SHA5127d5a6893346fba40e0e0ea87ea924e825604783aa38e1fa1a9c5c2c5a5819a94c84de57c654b7e50372be1ef8fb2e6d01d1a73a9858ea487bfb9af6237f7d856