Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2025 00:23

General

  • Target

    2025-02-03_1d7c6f8114b644a9f86584331a288e90_frostygoop_luca-stealer_poet-rat_snatch.exe

  • Size

    19.4MB

  • MD5

    1d7c6f8114b644a9f86584331a288e90

  • SHA1

    2b88f8c5b2a31e23d672c621f8e732050458c3bc

  • SHA256

    ad674f20b86dfe194607df0785de1ccebf2a5c66fc4e38f7968ebb1bcac3ed2d

  • SHA512

    b9997bf52f609fc01c4716ac74e7068fbaaa497c019062589b9c6bd5ff63527c12b649c4ab76cd1539b3d531b9bcc583a6f6fc8debea400f68748c0678d9feab

  • SSDEEP

    196608:Mg5ojyrBQTmr6njiDcpCnqLbJ2Z3VbtltNjkOJSyHAZRkhNJNXC:MGo3Tmen2Ipb8Z7fd7bvJNX

Malware Config

Signatures

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 11 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-02-03_1d7c6f8114b644a9f86584331a288e90_frostygoop_luca-stealer_poet-rat_snatch.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-02-03_1d7c6f8114b644a9f86584331a288e90_frostygoop_luca-stealer_poet-rat_snatch.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Windows\explorer.exe
      explorer C:\Users\Admin\AppData\Local\Temp\IMG_3465096071.jpg
      2⤵
        PID:5056
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1288
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\IMG_3465096071.jpg" /ForceBootstrapPaint3D
        2⤵
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2396
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
      1⤵
      • Drops file in System32 directory
      PID:1944
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:2340

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IMG_3465096071.jpg

      Filesize

      217KB

      MD5

      6afa7a6289e0cf36b61d4f85552a1891

      SHA1

      576afb049080a39ffdf17274a84d7a809533bd05

      SHA256

      9342bfc35b6dd7e5ef51488f3e7f1c536ef03d859bf57d25c14fd11eb4d92009

      SHA512

      f44bff52038de3459474734c0714fe7517aeb344f560d30ab57d4ff6d73860d36ac1f36d487efb2a74d4e06f19d757200c72d3488dd3c6c4113ec0d051b676f7

    • C:\Users\Admin\AppData\Local\Temp\Session Storage_8.temp\CURRENT.bak

      Filesize

      16B

      MD5

      46295cac801e5d4857d09837238a6394

      SHA1

      44e0fa1b517dbf802b18faf0785eeea6ac51594b

      SHA256

      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

      SHA512

      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

    • C:\Users\Admin\AppData\Local\Temp\Session Storage_8.temp\MANIFEST-000001

      Filesize

      41B

      MD5

      5af87dfd673ba2115e2fcf5cfdb727ab

      SHA1

      d5b5bbf396dc291274584ef71f444f420b6056f1

      SHA256

      f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

      SHA512

      de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

    • memory/1944-23-0x00000173A35B0000-0x00000173A35C0000-memory.dmp

      Filesize

      64KB

    • memory/1944-18-0x00000173A3560000-0x00000173A3570000-memory.dmp

      Filesize

      64KB

    • memory/1944-36-0x00000173AC0F0000-0x00000173AC0F1000-memory.dmp

      Filesize

      4KB

    • memory/1944-42-0x00000173AC170000-0x00000173AC171000-memory.dmp

      Filesize

      4KB

    • memory/1944-82-0x00000173AC170000-0x00000173AC171000-memory.dmp

      Filesize

      4KB

    • memory/1944-91-0x00000173AC200000-0x00000173AC201000-memory.dmp

      Filesize

      4KB

    • memory/1944-95-0x00000173AC200000-0x00000173AC201000-memory.dmp

      Filesize

      4KB

    • memory/1944-110-0x00000173AC210000-0x00000173AC211000-memory.dmp

      Filesize

      4KB

    • memory/1944-131-0x00000173AC210000-0x00000173AC211000-memory.dmp

      Filesize

      4KB