Analysis
-
max time kernel
93s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 14:05
Behavioral task
behavioral1
Sample
2024-10-03_c8a86465aaa42b8a5cdc9a9d43641490_snatch.exe
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-10-03_c8a86465aaa42b8a5cdc9a9d43641490_snatch.exe
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
2024-10-03_c8a86465aaa42b8a5cdc9a9d43641490_snatch.exe
-
Size
9.0MB
-
MD5
c8a86465aaa42b8a5cdc9a9d43641490
-
SHA1
015bc8ba0d01c17118d56e42fc3d5b6ec1a0f0ed
-
SHA256
52a15f731195417fbcca17bfbcc4a03ea4a6b80b21cd1aada4553422b60ca170
-
SHA512
d5bbcc382931c2292ca85d0e85166567ad2443f0fb1f4dbb7ad02d905a65e064cb39d652522c1f55594812170bddd69999ec3d70641ded4854d0df41f3da486d
-
SSDEEP
98304:u+jD3Vp7NNKy8NrQSIkVIe33KN+OvtkutjQUC3f717OGFl4ZNmJmMswrVOuWkg6p:zDK4SI46N+OvthtMUC3f5TcZOiwrVOd
Score
5/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3828-0-0x0000000000400000-0x0000000000CF8000-memory.dmp upx behavioral2/memory/3828-1-0x0000000000400000-0x0000000000CF8000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3828 2024-10-03_c8a86465aaa42b8a5cdc9a9d43641490_snatch.exe 3828 2024-10-03_c8a86465aaa42b8a5cdc9a9d43641490_snatch.exe 3828 2024-10-03_c8a86465aaa42b8a5cdc9a9d43641490_snatch.exe 3828 2024-10-03_c8a86465aaa42b8a5cdc9a9d43641490_snatch.exe