Analysis
-
max time kernel
95s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-08-2024 08:23
Behavioral task
behavioral1
Sample
snss2.bin.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
snss2.bin.exe
Resource
win10v2004-20240802-en
General
-
Target
snss2.bin.exe
-
Size
7.4MB
-
MD5
afea68327bd3cb05fea2420848065499
-
SHA1
e057f60b9e54b139e2fdbc63b141533c4946c8d5
-
SHA256
039b95904c2dacfb2fd0798010837023349478dbbb9f70bf52a2f79e4735b5b4
-
SHA512
be1c174bdbff87c38299c880ac93d4959d8048817439511bec59c281f9f1f773d501017cc52963da82ce8941eecd2cf002ed44dc34e3bd4e7ba6b8eec50c9dbb
-
SSDEEP
98304:fiMrdaUIJ3sxQvmzLvqwBOZTcjgxffDjqJbzEwPgo3dkvmnXX:Ki68xQ+zLJOZwjgZ7Utc2X
Malware Config
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4712-1-0x0000000000CC0000-0x00000000014BC000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
explorer.exedescription pid Process procid_target PID 4064 created 2652 4064 explorer.exe 44 -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 5104 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
snss2.bin.exedescription pid Process procid_target PID 4712 set thread context of 5104 4712 snss2.bin.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
snss2.bin.execmd.exeexplorer.exeopenwith.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language snss2.bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
snss2.bin.execmd.exeexplorer.exeopenwith.exepid Process 4712 snss2.bin.exe 4712 snss2.bin.exe 5104 cmd.exe 5104 cmd.exe 4064 explorer.exe 4064 explorer.exe 944 openwith.exe 944 openwith.exe 944 openwith.exe 944 openwith.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
snss2.bin.execmd.exepid Process 4712 snss2.bin.exe 5104 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
snss2.bin.exepid Process 4712 snss2.bin.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
snss2.bin.execmd.exeexplorer.exedescription pid Process procid_target PID 4712 wrote to memory of 5104 4712 snss2.bin.exe 85 PID 4712 wrote to memory of 5104 4712 snss2.bin.exe 85 PID 4712 wrote to memory of 5104 4712 snss2.bin.exe 85 PID 4712 wrote to memory of 5104 4712 snss2.bin.exe 85 PID 5104 wrote to memory of 4064 5104 cmd.exe 87 PID 5104 wrote to memory of 4064 5104 cmd.exe 87 PID 5104 wrote to memory of 4064 5104 cmd.exe 87 PID 5104 wrote to memory of 4064 5104 cmd.exe 87 PID 4064 wrote to memory of 944 4064 explorer.exe 92 PID 4064 wrote to memory of 944 4064 explorer.exe 92 PID 4064 wrote to memory of 944 4064 explorer.exe 92 PID 4064 wrote to memory of 944 4064 explorer.exe 92 PID 4064 wrote to memory of 944 4064 explorer.exe 92
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2652
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\snss2.bin.exe"C:\Users\Admin\AppData\Local\Temp\snss2.bin.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD536af6b5781f014851fe3237014f64eb6
SHA19fa1db24946d5b15f7a1ce0489b1d7ec1b4819e4
SHA25617fda227a836bb4eeb4029177848a045d8764936f61a513845669f0a523aebac
SHA5126c82275bb6d285f26e8dc708bdbe18f10965b85b34761049e0ce50bdc8d61f6abb37f148dd14c4965b8118aea0a3ac84e6fc53791f6f2206776745c604d8110b