Analysis
-
max time kernel
153s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 19:48
Behavioral task
behavioral1
Sample
2025-03-10_328a0b79e659a926f56bcaffe13ff347_frostygoop_poet-rat_sliver_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-10_328a0b79e659a926f56bcaffe13ff347_frostygoop_poet-rat_sliver_snatch.exe
Resource
win10v2004-20250217-en
General
-
Target
2025-03-10_328a0b79e659a926f56bcaffe13ff347_frostygoop_poet-rat_sliver_snatch.exe
-
Size
681.0MB
-
MD5
328a0b79e659a926f56bcaffe13ff347
-
SHA1
f3aded348268faf23a69e04f1db3c9ff9d66ab22
-
SHA256
3ee70db5d16cc166ed1b7837aa0f9a8d658127f8d6a7c47f9be83905bcb0ef21
-
SHA512
9e5ab5bf3c038783681f92373d1acb184bcc7bd4e38275632ce6f92fffa5164dbf2d0f0f8bd035119a1f04db9efd87beec833f8a3949e6314657b242e27eca12
-
SSDEEP
12582912:KXRs1wQfQaEYPxk39eCSiQzVkVZ1F/4I4U7U2NSKT+aGPHkHHgfshdB:2ZZYPY9ehc1F/74QJgGxdB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4396 KhqSZFQxEb.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-10_328a0b79e659a926f56bcaffe13ff347_frostygoop_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KhqSZFQxEb.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5000 schtasks.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4204 wrote to memory of 3892 4204 2025-03-10_328a0b79e659a926f56bcaffe13ff347_frostygoop_poet-rat_sliver_snatch.exe 96 PID 4204 wrote to memory of 3892 4204 2025-03-10_328a0b79e659a926f56bcaffe13ff347_frostygoop_poet-rat_sliver_snatch.exe 96 PID 4204 wrote to memory of 3892 4204 2025-03-10_328a0b79e659a926f56bcaffe13ff347_frostygoop_poet-rat_sliver_snatch.exe 96 PID 3892 wrote to memory of 5000 3892 cmd.exe 98 PID 3892 wrote to memory of 5000 3892 cmd.exe 98 PID 3892 wrote to memory of 5000 3892 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-10_328a0b79e659a926f56bcaffe13ff347_frostygoop_poet-rat_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-10_328a0b79e659a926f56bcaffe13ff347_frostygoop_poet-rat_sliver_snatch.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\cmd.execmd.exe /C schtasks /create /tn xbZstzVdno /tr C:\Users\Admin\AppData\Roaming\xbZstzVdno\KhqSZFQxEb.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn xbZstzVdno /tr C:\Users\Admin\AppData\Roaming\xbZstzVdno\KhqSZFQxEb.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5000
-
-
-
C:\Users\Admin\AppData\Roaming\xbZstzVdno\KhqSZFQxEb.exeC:\Users\Admin\AppData\Roaming\xbZstzVdno\KhqSZFQxEb.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4396