Overview
overview
10Static
static
3Snake-main.rar
windows7-x64
3Snake-main.rar
windows10-2004-x64
3Snake-Main...en.txt
windows7-x64
1Snake-Main...en.txt
windows10-2004-x64
1Snake-Main/Start.bat
windows7-x64
7Snake-Main/Start.bat
windows10-2004-x64
10Snake-Main...ts.txt
windows7-x64
1Snake-Main...ts.txt
windows10-2004-x64
1Snake-Main...ke.exe
windows7-x64
7Snake-Main...ke.exe
windows10-2004-x64
10Stub.pyc
windows7-x64
3Stub.pyc
windows10-2004-x64
3Snake-Main...ake.py
windows7-x64
3Snake-Main...ake.py
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 14:00
Behavioral task
behavioral1
Sample
Snake-main.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Snake-main.rar
Resource
win10v2004-20240708-en
Behavioral task
behavioral3
Sample
Snake-Main/Bot Token.txt
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Snake-Main/Bot Token.txt
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
Snake-Main/Start.bat
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Snake-Main/Start.bat
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
Snake-Main/requirements.txt
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Snake-Main/requirements.txt
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
Snake-Main/vep-version/File/Stub/Snake/Snake.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Snake-Main/vep-version/File/Stub/Snake/Snake.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
Stub.pyc
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Stub.pyc
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
Snake-Main/vep-version/File/Stub/other/coded/Snake.py
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Snake-Main/vep-version/File/Stub/other/coded/Snake.py
Resource
win10v2004-20240704-en
General
-
Target
Snake-Main/vep-version/File/Stub/other/coded/Snake.py
-
Size
7KB
-
MD5
77b6e524a8e2f139689e3cc0560ee1c2
-
SHA1
bc1034f88e9452e202fa02719d540f6592840049
-
SHA256
0a7a0e525fec16389e94f8e70e3c07b3a0e7628e6e2928112e255c203e0d15ee
-
SHA512
9901543520638d3afb6b20d1a8f5a19dddba8b2b59916d29420189a37baa30e65eaa973b383669447487cd6d0f5882c7fc217359a5b00db260e9381c48bd8163
-
SSDEEP
24:I777777777777777777xM777777777777777777xM777777777777xM77777777h:H
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\py_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2820 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2820 AcroRd32.exe 2820 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2548 1952 cmd.exe 31 PID 1952 wrote to memory of 2548 1952 cmd.exe 31 PID 1952 wrote to memory of 2548 1952 cmd.exe 31 PID 2548 wrote to memory of 2820 2548 rundll32.exe 32 PID 2548 wrote to memory of 2820 2548 rundll32.exe 32 PID 2548 wrote to memory of 2820 2548 rundll32.exe 32 PID 2548 wrote to memory of 2820 2548 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Snake-Main\vep-version\File\Stub\other\coded\Snake.py1⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Snake-Main\vep-version\File\Stub\other\coded\Snake.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Snake-Main\vep-version\File\Stub\other\coded\Snake.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD521d0a91400cdaba79c0d2fb7452ab1d2
SHA1405c6fd404f2499e1f0207157615a717c3fa096d
SHA2565248b687078a47117dc4ef0e9d77f622c632a783b85ef38001c51258abadd11c
SHA512c30647a9a35cad1edd9b663f47b28e504fea62a0a58ec3e345f862af9506b5c313d4fd03520195cdec86e47dd3c59d71769eadfb419ef80686309fc51a01f803