Analysis

  • max time kernel
    135s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 17:23

General

  • Target

    2024-12-20_767991db0b26585a263d7c8d0d4d262c_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe

  • Size

    9.9MB

  • MD5

    767991db0b26585a263d7c8d0d4d262c

  • SHA1

    5ee9f15e849a2ad5963203b096188300e6f41297

  • SHA256

    9371f23461b720fb7cd9070e520428164a60a7e248ca1f95b46bf821ec0374f2

  • SHA512

    1a9f5634804ba25113c2511d5d5bdc32784947b0b1c989bca4dd8c3ba91455521fffd4c4d9e411642f359e4cde7e36a764c89d1aaa1dd3465884a943d4cf77f4

  • SSDEEP

    98304:0GlXQbXPxwVKnM1itd0ubsQPDc6vEtWGgbZmBRzB:0GWXPxwUnvlbsQPA6ssQz

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-20_767991db0b26585a263d7c8d0d4d262c_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-20_767991db0b26585a263d7c8d0d4d262c_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4940
    • C:\Windows\system32\attrib.exe
      attrib +h +s C:\Users\Admin\AppData\Local\Temp\2024-12-20_767991db0b26585a263d7c8d0d4d262c_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe
      2⤵
      • Views/modifies file attributes
      PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads