Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 16:41
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe
Resource
win7-20240903-en
General
-
Target
2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe
-
Size
5.0MB
-
MD5
e33c8a921ebb408f81e97e4fc5210696
-
SHA1
1aa7b8fd7ebe4cc124a92db223689c20ef50d4a5
-
SHA256
e683fc5582f346d3c1e1e20f888c0fae1e978acf348f4e8c79f68378dca1288b
-
SHA512
19cd67a93281aa0eb20f9f8d6d13df976f0ec021e947288e74a7b4bc8a8ec673fd6fc056ab359e82f2571e867c15d26660a3f41fe74b0eb1b33c19f6cb66c61e
-
SSDEEP
49152:pFf8RRWuQFfMau8lRam6N0qkUb2GDtZ2kQ/7Wz3+VksmYVQMqEi33ozVZd7v6x11:pZ8kFfMP3m6N9DbL2kgqMqEi33oNc
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2708 set thread context of 2808 2708 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2808 2708 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 30 PID 2708 wrote to memory of 2808 2708 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 30 PID 2708 wrote to memory of 2808 2708 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 30 PID 2708 wrote to memory of 2808 2708 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 30 PID 2708 wrote to memory of 2808 2708 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 30 PID 2708 wrote to memory of 2808 2708 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 30 PID 2708 wrote to memory of 2808 2708 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 30 PID 2708 wrote to memory of 2808 2708 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 30 PID 2708 wrote to memory of 2808 2708 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 30 PID 2708 wrote to memory of 2808 2708 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵PID:2808
-