Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 22:31
Behavioral task
behavioral1
Sample
63079f34-b294-4790-bfd5-bbad82995295/snss1.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
63079f34-b294-4790-bfd5-bbad82995295/snss1.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
63079f34-b294-4790-bfd5-bbad82995295/snss2.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
63079f34-b294-4790-bfd5-bbad82995295/snss2.exe
Resource
win10v2004-20240611-en
General
-
Target
63079f34-b294-4790-bfd5-bbad82995295/snss2.exe
-
Size
5.3MB
-
MD5
9e2eb8188c5a194014e46598cbc80c70
-
SHA1
d83d68b451836928c830808a9e408c8f2cce2210
-
SHA256
d265adb64a79f3b27e77e11e093342b2df14840266deedabf1189bc539cc58fb
-
SHA512
3ff5fa8c0f1eb5bd7bf46a5a27392fb0865d61d8c09549f9d7f29306e30275a5b3436c520f82142dc7d3780c468aab2e7c79361457f7c5aa11a132c1ec49c009
-
SSDEEP
98304:PlW75lC85H0kxwkL+Wd5Cz1ljuDDCNlSM:Pwhr+45CzvjBlh
Malware Config
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
resource yara_rule behavioral4/memory/4492-0-0x00007FF6F4A80000-0x00007FF6F4FF6000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2900 created 2812 2900 explorer.exe 49 -
Deletes itself 1 IoCs
pid Process 1112 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4492 set thread context of 1112 4492 snss2.exe 84 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4492 snss2.exe 4492 snss2.exe 1112 cmd.exe 1112 cmd.exe 2900 explorer.exe 2900 explorer.exe 68 dialer.exe 68 dialer.exe 68 dialer.exe 68 dialer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4492 snss2.exe 1112 cmd.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4492 wrote to memory of 1112 4492 snss2.exe 84 PID 4492 wrote to memory of 1112 4492 snss2.exe 84 PID 4492 wrote to memory of 1112 4492 snss2.exe 84 PID 4492 wrote to memory of 1112 4492 snss2.exe 84 PID 1112 wrote to memory of 2900 1112 cmd.exe 87 PID 1112 wrote to memory of 2900 1112 cmd.exe 87 PID 1112 wrote to memory of 2900 1112 cmd.exe 87 PID 1112 wrote to memory of 2900 1112 cmd.exe 87 PID 2900 wrote to memory of 68 2900 explorer.exe 91 PID 2900 wrote to memory of 68 2900 explorer.exe 91 PID 2900 wrote to memory of 68 2900 explorer.exe 91 PID 2900 wrote to memory of 68 2900 explorer.exe 91 PID 2900 wrote to memory of 68 2900 explorer.exe 91
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2812
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:68
-
-
C:\Users\Admin\AppData\Local\Temp\63079f34-b294-4790-bfd5-bbad82995295\snss2.exe"C:\Users\Admin\AppData\Local\Temp\63079f34-b294-4790-bfd5-bbad82995295\snss2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2900
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD51a031562036132e6daab9484f428f496
SHA1d4f60033cccf94b37de79b8267b1530e31c96d9a
SHA256b378831c3458fc9257deab59bec49c4b62b701c14a078a7992da2419f91d929f
SHA51218090541a74be8c5e19132f3a4d13cabbc6c21d9ec764a79d4a83aa959556dd2e16061b3da25508412d7ad279d9dc93aca42d7b3d07d234c13d29aafe724341c