Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-08-2024 08:23
Behavioral task
behavioral1
Sample
snss2.bin.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
snss2.bin.exe
Resource
win10v2004-20240802-en
General
-
Target
snss2.bin.exe
-
Size
7.4MB
-
MD5
afea68327bd3cb05fea2420848065499
-
SHA1
e057f60b9e54b139e2fdbc63b141533c4946c8d5
-
SHA256
039b95904c2dacfb2fd0798010837023349478dbbb9f70bf52a2f79e4735b5b4
-
SHA512
be1c174bdbff87c38299c880ac93d4959d8048817439511bec59c281f9f1f773d501017cc52963da82ce8941eecd2cf002ed44dc34e3bd4e7ba6b8eec50c9dbb
-
SSDEEP
98304:fiMrdaUIJ3sxQvmzLvqwBOZTcjgxffDjqJbzEwPgo3dkvmnXX:Ki68xQ+zLJOZwjgZ7Utc2X
Malware Config
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2480-1-0x0000000000400000-0x0000000000BFC000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2724 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
snss2.bin.exedescription pid process target process PID 2480 set thread context of 2724 2480 snss2.bin.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
snss2.bin.execmd.exeexplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language snss2.bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
snss2.bin.execmd.exepid process 2480 snss2.bin.exe 2480 snss2.bin.exe 2724 cmd.exe 2724 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
snss2.bin.execmd.exepid process 2480 snss2.bin.exe 2724 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
snss2.bin.exepid process 2480 snss2.bin.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
snss2.bin.execmd.exedescription pid process target process PID 2480 wrote to memory of 2724 2480 snss2.bin.exe cmd.exe PID 2480 wrote to memory of 2724 2480 snss2.bin.exe cmd.exe PID 2480 wrote to memory of 2724 2480 snss2.bin.exe cmd.exe PID 2480 wrote to memory of 2724 2480 snss2.bin.exe cmd.exe PID 2480 wrote to memory of 2724 2480 snss2.bin.exe cmd.exe PID 2724 wrote to memory of 2652 2724 cmd.exe explorer.exe PID 2724 wrote to memory of 2652 2724 cmd.exe explorer.exe PID 2724 wrote to memory of 2652 2724 cmd.exe explorer.exe PID 2724 wrote to memory of 2652 2724 cmd.exe explorer.exe PID 2724 wrote to memory of 2652 2724 cmd.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\snss2.bin.exe"C:\Users\Admin\AppData\Local\Temp\snss2.bin.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD53a77c3614588d929d8db9716192c277e
SHA1fd61889c6beb0f187987c58118f98284a3be8c73
SHA256488e66af419acb369fe9ca97cefae46419bb063f42cd52d251414a227c51ff4d
SHA5126ae4b5a5ee17f7ad53532603a76f6ee8716f014c346753e265e2f0bfb501e2a7b4042bfc7abc7f7b4ac891b6db70b24808c83b355d000d841bc487b0aa660bb8