Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 15:29

General

  • Target

    Snook13s.exe

  • Size

    1.3MB

  • MD5

    fcefd307d52481eb67325b3fc295980a

  • SHA1

    70ff818096785a113d0ca2c12019d14bc80fa390

  • SHA256

    bf91d4e9c63aec0b8dbab17b6e13187fd910428ec883b4a080054b03f4584cc7

  • SHA512

    3440dc3b5133d27a7e6ec232861ae69b44d52d4108fd268b280d37c162fb4c5e4f08e7221a58ebde06c6d36088841a6b908ab9a73eb1e911c26a55ca16ce981f

  • SSDEEP

    24576:NMcUX4eLAzYQswBIA4w1dvchvRcjWLyA8pIG6+9zcpKSj2erDnB4TdIw+FwqgW1:NMd4eLAzYdX6dvooW84pPj2KDnaxEj1

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Snook13s.exe
    "C:\Users\Admin\AppData\Local\Temp\Snook13s.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Windows\system32\msiexec.exe
      /i "C:\Users\Admin\AppData\Roaming\JHC Software Limited\Snooker147 & Poolster\install\SnookerPoolster.msi" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\Snook13s.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\"
      2⤵
      • Enumerates connected drives
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2988
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 1CDFDE8C20B79F460F15B6FCAD054DE5 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSIDAA6.tmp

    Filesize

    12KB

    MD5

    dceb7732ed78c465c4d759956501b171

    SHA1

    2da8964ad354a0a53cdac281ebdadbe9dfa22c2b

    SHA256

    150b4a3ca67ea766b282a0a75651b43058f593c5083eb7b5893f031619c9dd07

    SHA512

    655ce5c1d3f13fd8e5b559bf5bded5465f71438c7a0a280e9f95d352984b8ad836ab77c4e2bcbbce8c15ff1ebe6e1dca6a9f1282144880977b77ced7dd38f380

  • C:\Users\Admin\AppData\Local\Temp\Snook13s.ini

    Filesize

    102B

    MD5

    0dbb32aad2d012c35ff729e9d4113c95

    SHA1

    7283421c8179ac72c849fc4a93d4a3be1dc828b9

    SHA256

    775ad9a68d14f2ac7aaa0b6a2209ae1fe0c3033aa0c8ff41b84527008580c75c

    SHA512

    42d62b609581ed9fc7bc0e3d6a0ba74233d9cf6d1f526cc8480edee543957bb1c54eee3b58c62b7a023750e0f856e23e42da94cedb04ada190eba23dd37c5dc4

  • C:\Users\Admin\AppData\Roaming\JHC Software Limited\Snooker147 & Poolster\install\SnookerPoolster.msi

    Filesize

    182KB

    MD5

    5d68055820370dc8f1d4e8f37173c85c

    SHA1

    2f0d590467bf64f7249c60a35e97582d96497e85

    SHA256

    55aa27845681f7c1d2be64389f6f38c346da4801ef017a95901bc326b4664955

    SHA512

    d65eb4a7c330e3812d40d51d9feb1c55a780bd0382a60723cec6426b3655af3a2564996a11abcb66d4b80ed3a91d6028df4831466d5f84540a0716156204eb13