Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-01-2025 17:19
Static task
static1
General
-
Target
2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe
-
Size
5.0MB
-
MD5
e33c8a921ebb408f81e97e4fc5210696
-
SHA1
1aa7b8fd7ebe4cc124a92db223689c20ef50d4a5
-
SHA256
e683fc5582f346d3c1e1e20f888c0fae1e978acf348f4e8c79f68378dca1288b
-
SHA512
19cd67a93281aa0eb20f9f8d6d13df976f0ec021e947288e74a7b4bc8a8ec673fd6fc056ab359e82f2571e867c15d26660a3f41fe74b0eb1b33c19f6cb66c61e
-
SSDEEP
49152:pFf8RRWuQFfMau8lRam6N0qkUb2GDtZ2kQ/7Wz3+VksmYVQMqEi33ozVZd7v6x11:pZ8kFfMP3m6N9DbL2kgqMqEi33oNc
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4920 set thread context of 4236 4920 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 77 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4920 wrote to memory of 4236 4920 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 77 PID 4920 wrote to memory of 4236 4920 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 77 PID 4920 wrote to memory of 4236 4920 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 77 PID 4920 wrote to memory of 4236 4920 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 77 PID 4920 wrote to memory of 4236 4920 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 77 PID 4920 wrote to memory of 4236 4920 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 77 PID 4920 wrote to memory of 4236 4920 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 77 PID 4920 wrote to memory of 4236 4920 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 77 PID 4920 wrote to memory of 4236 4920 2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-09_e33c8a921ebb408f81e97e4fc5210696_frostygoop_poet-rat_snatch.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4236
-