Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2025 23:21
Behavioral task
behavioral1
Sample
2025-02-16_0413b8b0aa1528459d056f9776e335c8_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
2025-02-16_0413b8b0aa1528459d056f9776e335c8_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe
Resource
win10v2004-20250211-en
General
-
Target
2025-02-16_0413b8b0aa1528459d056f9776e335c8_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe
-
Size
10.3MB
-
MD5
0413b8b0aa1528459d056f9776e335c8
-
SHA1
452d23e62183e92bd349b0204468a1e4fb2896c4
-
SHA256
6704e7013687a9a0c7787b5edffdfc87246eda472cfa885469ee8fc6d0fe19ea
-
SHA512
c5a36a4a29d616c9af2038b03a15b7f91e058501ea34afb84d1dd04e11a3eb0cf17a09d25d41a37367506bcd0193c8df1cd571fd9985528667cb527fe0770286
-
SSDEEP
98304:HOBUlG77NlZFwclKKjYJ5Uz5epeFA0rNlhEH7m:HsN5wcu5Uz5epTuiH7
Malware Config
Signatures
-
Downloads MZ/PE file 2 IoCs
flow pid Process 29 1768 Process not Found 52 3516 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 1388 setup.exe 3328 setup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2656314083-4170277356-267438488-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\SecurityHealthSystray.exe" 2025-02-16_0413b8b0aa1528459d056f9776e335c8_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 38 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\edge_game_assist\VERSION setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EA0E7362-98EB-444A-A2FC-2370F2C01161}\EDGEMITMP_E9022.tmp\SETUP.EX_ MicrosoftEdge_X64_133.0.3065.69.exe File opened for modification C:\Program Files\MsEdgeCrashpad\settings.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\BHO\ie_to_edge_bho.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\BHO\ie_to_edge_stub.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\cookie_exporter.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\EBWebView\x64\EmbeddedBrowserWebView.dll setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\concrt140.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\dxil.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Edge.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\icudtl.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\133.0.3065.69.manifest setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\d3dcompiler_47.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\EBWebView\x86\EmbeddedBrowserWebView.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\Extensions\external_extensions.json setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\identity_helper.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\elevation_service.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EA0E7362-98EB-444A-A2FC-2370F2C01161}\EDGEMITMP_E9022.tmp\setup.exe MicrosoftEdge_X64_133.0.3065.69.exe File opened for modification C:\Program Files\MsEdgeCrashpad\metadata setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Temp\source1388_32385315\MSEDGE.7z setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\dual_engine_adapter_x64.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\dxcompiler.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\edge_feedback\camera_mf_trace.wprp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\edge_feedback\mf_trace.wprp setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\identity_proxy\beta.identity_helper.exe.manifest setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\throttle_store.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\BHO\ie_to_edge_bho_64.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\elevated_tracing_service.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\ffmpeg.dll setup.exe File opened for modification C:\Program Files\msedge_installer.log setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\AdSelectionAttestationsPreloaded\manifest.json setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\EdgeWebView.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\edge_game_assist\EdgeGameAssist.msix setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\settings.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\AdSelectionAttestationsPreloaded\ad-selection-attestations.dat setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\delegatedWebFeatures.sccd setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\133.0.3065.69\eventlog_provider.dll setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1844 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2088 2025-02-16_0413b8b0aa1528459d056f9776e335c8_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe Token: 33 1388 setup.exe Token: SeIncBasePriorityPrivilege 1388 setup.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2088 wrote to memory of 764 2088 2025-02-16_0413b8b0aa1528459d056f9776e335c8_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe 88 PID 2088 wrote to memory of 764 2088 2025-02-16_0413b8b0aa1528459d056f9776e335c8_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe 88 PID 1504 wrote to memory of 1388 1504 MicrosoftEdge_X64_133.0.3065.69.exe 104 PID 1504 wrote to memory of 1388 1504 MicrosoftEdge_X64_133.0.3065.69.exe 104 PID 1388 wrote to memory of 3328 1388 setup.exe 105 PID 1388 wrote to memory of 3328 1388 setup.exe 105 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 764 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-16_0413b8b0aa1528459d056f9776e335c8_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-16_0413b8b0aa1528459d056f9776e335c8_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Local\Temp\2025-02-16_0413b8b0aa1528459d056f9776e335c8_frostygoop_luca-stealer_ngrbot_poet-rat_snatch.exe2⤵
- Views/modifies file attributes
PID:764
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODM0MTAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NTUzNjg2NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0NzQyNjM2MTc0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1844
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EA0E7362-98EB-444A-A2FC-2370F2C01161}\MicrosoftEdge_X64_133.0.3065.69.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EA0E7362-98EB-444A-A2FC-2370F2C01161}\MicrosoftEdge_X64_133.0.3065.69.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EA0E7362-98EB-444A-A2FC-2370F2C01161}\EDGEMITMP_E9022.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EA0E7362-98EB-444A-A2FC-2370F2C01161}\EDGEMITMP_E9022.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EA0E7362-98EB-444A-A2FC-2370F2C01161}\MicrosoftEdge_X64_133.0.3065.69.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EA0E7362-98EB-444A-A2FC-2370F2C01161}\EDGEMITMP_E9022.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EA0E7362-98EB-444A-A2FC-2370F2C01161}\EDGEMITMP_E9022.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EA0E7362-98EB-444A-A2FC-2370F2C01161}\EDGEMITMP_E9022.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x228,0x22c,0x230,0x224,0x234,0x7ff6cfc36a68,0x7ff6cfc36a74,0x7ff6cfc36a803⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3328
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{EA0E7362-98EB-444A-A2FC-2370F2C01161}\EDGEMITMP_E9022.tmp\setup.exe
Filesize6.8MB
MD5bdb1aecedc15fc82a63083452dad45c2
SHA1a074fcd78665ff90ee3e50ffcccad5f6c3e7ddcb
SHA2564ea0907c3fc2c2f6a4259002312671c82e008846d49957bb3b9915612e35b99f
SHA51250909640c2957fc35dd5bcac3b51797aa5daa2fb95364e69df95d3577482e13f0c36a70ae098959cb9c2aaeb4cfe43025c1d8d55b5f8858b474bcb702609749d