Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-01-2025 01:04
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-26_221a88df8b81317b16c83c23a377fafc_frostygoop_luca-stealer_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-26_221a88df8b81317b16c83c23a377fafc_frostygoop_luca-stealer_snatch.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-26_221a88df8b81317b16c83c23a377fafc_frostygoop_luca-stealer_snatch.exe
-
Size
5.3MB
-
MD5
221a88df8b81317b16c83c23a377fafc
-
SHA1
d8f87ff4459de5f6722efd374f10d9389fb4b1cf
-
SHA256
4e67bb7a28b872d14749968f75cd954ca1506ceb91be8e8d8b4b930aa387134a
-
SHA512
0a1f3f70e0bbadac921343dc72d1ac66494acbaf0e9cad5cc43a71f1c3406da6c0f36a4401dfde8383b6d010988dbfd42a4418155fff33be756d80dbf679993e
-
SSDEEP
98304:a3qGL7+Z2+G7R5jHQ3h6uX8vKv4d94cS73Zz/Ocknja:aqC7+Z2+sYUAEF2V35/OcS
Malware Config
Extracted
latentbot
36123623672437247.zapto.org
Signatures
-
Latentbot family
-
Enumerates VirtualBox DLL files 2 TTPs 10 IoCs
description ioc Process File opened (read-only) C:\WINDOWS\system32\vboxoglpackspu.dll SgrmBroker.exe File opened (read-only) C:\WINDOWS\system32\vboxogl.dll SgrmBroker.exe File opened (read-only) C:\WINDOWS\system32\vboxoglcrutil.dll SgrmBroker.exe File opened (read-only) C:\WINDOWS\system32\vboxoglfeedbackspu.dll SgrmBroker.exe File opened (read-only) C:\WINDOWS\system32\vboxoglarrayspu.dll SgrmBroker.exe File opened (read-only) C:\WINDOWS\system32\vboxoglerrorspu.dll SgrmBroker.exe File opened (read-only) C:\WINDOWS\system32\vboxoglpassthroughspu.dll SgrmBroker.exe File opened (read-only) C:\WINDOWS\system32\vboxdisp.dll SgrmBroker.exe File opened (read-only) C:\WINDOWS\system32\vboxhook.dll SgrmBroker.exe File opened (read-only) C:\WINDOWS\system32\vboxmrxnp.dll SgrmBroker.exe -
Looks for VirtualBox drivers on disk 2 TTPs 4 IoCs
description ioc Process File opened (read-only) C:\WINDOWS\system32\drivers\VBoxMouse.sys SgrmBroker.exe File opened (read-only) C:\WINDOWS\system32\drivers\VBoxGuest.sys SgrmBroker.exe File opened (read-only) C:\WINDOWS\system32\drivers\VBoxSF.sys SgrmBroker.exe File opened (read-only) C:\WINDOWS\system32\drivers\VBoxVideo.sys SgrmBroker.exe -
Looks for VirtualBox executables on disk 2 TTPs 3 IoCs
description ioc Process File opened (read-only) C:\WINDOWS\system32\vboxservice.exe SgrmBroker.exe File opened (read-only) C:\WINDOWS\system32\vboxtray.exe SgrmBroker.exe File opened (read-only) C:\WINDOWS\system32\VBoxControl.exe SgrmBroker.exe -
Executes dropped EXE 6 IoCs
pid Process 832 973d6eb4-0334-7589-203f-ba9fca281406.exe 1476 svchost.exe 2156 973d6eb4-0334-7589-203f-ba9fca281406.exe 2676 svchost.exe 2680 SgrmBroker.exe 2808 PasswordDecoder.exe -
Loads dropped DLL 5 IoCs
pid Process 1476 svchost.exe 1476 svchost.exe 2156 973d6eb4-0334-7589-203f-ba9fca281406.exe 2156 973d6eb4-0334-7589-203f-ba9fca281406.exe 2156 973d6eb4-0334-7589-203f-ba9fca281406.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
resource yara_rule behavioral1/files/0x0008000000016d4a-28.dat upx behavioral1/memory/2680-61-0x0000000000360000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/2680-76-0x0000000000360000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/2680-77-0x0000000000360000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/2680-93-0x0000000000360000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/2680-110-0x0000000000360000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/2680-127-0x0000000000360000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/2680-144-0x0000000000360000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/2680-161-0x0000000000360000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/2680-173-0x0000000000360000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/2680-195-0x0000000000360000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/2680-209-0x0000000000360000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/2680-226-0x0000000000360000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/2680-243-0x0000000000360000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/2680-255-0x0000000000360000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/2680-277-0x0000000000360000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/2680-289-0x0000000000360000-0x0000000000A1D000-memory.dmp upx behavioral1/memory/2680-305-0x0000000000360000-0x0000000000A1D000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe 973d6eb4-0334-7589-203f-ba9fca281406.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 973d6eb4-0334-7589-203f-ba9fca281406.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 973d6eb4-0334-7589-203f-ba9fca281406.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 832 973d6eb4-0334-7589-203f-ba9fca281406.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2472 1996 2025-01-26_221a88df8b81317b16c83c23a377fafc_frostygoop_luca-stealer_snatch.exe 32 PID 1996 wrote to memory of 2472 1996 2025-01-26_221a88df8b81317b16c83c23a377fafc_frostygoop_luca-stealer_snatch.exe 32 PID 1996 wrote to memory of 2472 1996 2025-01-26_221a88df8b81317b16c83c23a377fafc_frostygoop_luca-stealer_snatch.exe 32 PID 2472 wrote to memory of 832 2472 cmd.exe 33 PID 2472 wrote to memory of 832 2472 cmd.exe 33 PID 2472 wrote to memory of 832 2472 cmd.exe 33 PID 2472 wrote to memory of 832 2472 cmd.exe 33 PID 832 wrote to memory of 1476 832 973d6eb4-0334-7589-203f-ba9fca281406.exe 34 PID 832 wrote to memory of 1476 832 973d6eb4-0334-7589-203f-ba9fca281406.exe 34 PID 832 wrote to memory of 1476 832 973d6eb4-0334-7589-203f-ba9fca281406.exe 34 PID 832 wrote to memory of 1476 832 973d6eb4-0334-7589-203f-ba9fca281406.exe 34 PID 1476 wrote to memory of 2156 1476 svchost.exe 35 PID 1476 wrote to memory of 2156 1476 svchost.exe 35 PID 1476 wrote to memory of 2156 1476 svchost.exe 35 PID 1476 wrote to memory of 2156 1476 svchost.exe 35 PID 2156 wrote to memory of 2680 2156 973d6eb4-0334-7589-203f-ba9fca281406.exe 37 PID 2156 wrote to memory of 2680 2156 973d6eb4-0334-7589-203f-ba9fca281406.exe 37 PID 2156 wrote to memory of 2680 2156 973d6eb4-0334-7589-203f-ba9fca281406.exe 37 PID 2156 wrote to memory of 2680 2156 973d6eb4-0334-7589-203f-ba9fca281406.exe 37 PID 2156 wrote to memory of 2808 2156 973d6eb4-0334-7589-203f-ba9fca281406.exe 38 PID 2156 wrote to memory of 2808 2156 973d6eb4-0334-7589-203f-ba9fca281406.exe 38 PID 2156 wrote to memory of 2808 2156 973d6eb4-0334-7589-203f-ba9fca281406.exe 38 PID 2156 wrote to memory of 2808 2156 973d6eb4-0334-7589-203f-ba9fca281406.exe 38 PID 2680 wrote to memory of 2292 2680 SgrmBroker.exe 41 PID 2680 wrote to memory of 2292 2680 SgrmBroker.exe 41 PID 2680 wrote to memory of 2292 2680 SgrmBroker.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-26_221a88df8b81317b16c83c23a377fafc_frostygoop_luca-stealer_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-26_221a88df8b81317b16c83c23a377fafc_frostygoop_luca-stealer_snatch.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\system32\cmd.execmd.exe /C start /b C:\Users\Admin\AppData\Local\Temp\973d6eb4-0334-7589-203f-ba9fca281406.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\973d6eb4-0334-7589-203f-ba9fca281406.exeC:\Users\Admin\AppData\Local\Temp\973d6eb4-0334-7589-203f-ba9fca281406.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\973d6eb4-0334-7589-203f-ba9fca281406.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\973d6eb4-0334-7589-203f-ba9fca281406.exe"C:\Users\Admin\AppData\Local\Temp\973d6eb4-0334-7589-203f-ba9fca281406.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Microsoft\SgrmBroker.exe"C:\Users\Admin\AppData\Local\Microsoft\SgrmBroker.exe"6⤵
- Enumerates VirtualBox DLL files
- Looks for VirtualBox drivers on disk
- Looks for VirtualBox executables on disk
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C del C:\Users\Admin\AppData\Local\Microsoft\SgrmBroker.exe7⤵PID:2292
-
-
-
C:\Users\Admin\AppData\Local\Microsoft\PasswordDecoder.exe"C:\Users\Admin\AppData\Local\Microsoft\PasswordDecoder.exe"6⤵
- Executes dropped EXE
PID:2808
-
-
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2676
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Indicator Removal
1File Deletion
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD5d105e96405c6ad6217f9b7035305eeb7
SHA1d39f8e9b4d9dc82bd2287858cfa1be55144ba6e6
SHA2569cf16cf49fcc827461ec6c94faedd37e61b34eaef073cf5bd1ac132a9310e0c1
SHA512cf12974e5474c96aa796e432d2e6dd934fcbe17a6c03d6bd815d10c76714740fa5c680429ef14aa1772021f3eefb949e1ca37fcb1643e8dd781c4751f704da6b
-
Filesize
3.7MB
MD57c1dbeaf7261a5002acfcabb1cebbc03
SHA14af995c6114bf0031435c5314cfb26d4a68996ad
SHA256628a3dc57e18f7f9d406eb5b90833dbc54654c8eccdb661be8a0a31b09d1e0cd
SHA512b18130959299c8201bc26d905e6c702d0f6c8a137ec45b9001323699f4ef8331e437c47bd02abcc9d9179063b5221e8c2ed8af7e4b8dc2b91ac265433e29d46a
-
Filesize
3.6MB
MD5dcdb85932e6e81c56c5d2d7517c8acf6
SHA1cf6f6224224e1627a23eccbe8f843c1f9b1101ab
SHA25668f2d440ccf6e893c39b60390412e2d1ae1a3f724b02c74498a61fae4f557068
SHA512474d6caad198a2cc65476df2999532e6f65004ffd9bf8096def70393453b5e3dcaa3051e5616c09548c8a0f59e819b39dc040be82dceacfe85cab7fbd4e5279f
-
Filesize
3.6MB
MD5602691bb886b7af853d18121031f8d3f
SHA19a427c9df07a1fd92892bb1d0aa7088e06950384
SHA256d0e40c8a3586cf1d6ff51ab8e7b538f846119c6a0680671a798fd299b11fd040
SHA512d03125a43802626f3b78f70204de6a0a389812e159906e44ac25de641cd563e129d471d88736cb53d47132848dd0d478ff59b7d1f95c37b2b85724d01f7004bc
-
Filesize
251KB
MD5ff1ef1f7402dbe8c48c43c4bb227d6c9
SHA1dab3da74ab196beedd3bfb1067050d09bbb94821
SHA25636cb921414c0179bdaf6a36b4b1f7293a3e9c32a5a98108ea4531737d35355b6
SHA512451f27e315c5cc23318e2d2e5faba0c70ac7c93760df39bcc415ee01a44af6d47d16324dca870dffa4f1b15bf577b262dc151e63c7c5ede00e2057c4b1932079
-
Filesize
79B
MD5017fac5294daf5668189b4c27b434046
SHA1b57f0db88938f233f41ac7071bce951f8448f8c7
SHA2569acfec1326d4b9ec91f11e6c0add0ffb97604ec8df9daa567e2079a6fd4797cc
SHA512a8c40c956585006d340a59347b5a232eb05402612f4ebc5311b7bd62163ef3743fb798c9446987e8c4936a6bb45f59139ca54db49238606a811cfcf23d5bd91b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
1.4MB
MD576d3246a3f8a02f193f979c5dd7ec752
SHA1d7f4aab2a849cd2e1f18f9cf08ef43e450126f14
SHA256068552717ffe55457cd20ebd723be3f471d04879a04c14b679eaa0a321ebbcc4
SHA512285a3732459c588a251a0971c6cdf224a0f5b467f90d339d8b1c39c7c6daded1fdb9cfeef13872e3a893bfcf0f236f3355d5a8ef24057daaeb914a08a4719b52
-
Filesize
3.3MB
MD583d058947260839070f365746d7ce1fc
SHA1f9767615fbc6d316fc35ffaeb272910336291f5c
SHA256502a7f750550d7b80296b7ebed254245646233f4acdcdb274902524f9fa43c6e
SHA51204bfbb68450c28861724a8df895bd4e272f568559ff4e5d07e19db498f4c9e69d276fd78a4cd6269a4b67f5edaa2510a6ac5f020b615e2baadc0a96898363d14