Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 11:20
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-25_7562eda6698149f6f80248b7ad6dcae1_frostygoop_ghostlocker_knight_luca-stealer_poet-rat_sliver_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-25_7562eda6698149f6f80248b7ad6dcae1_frostygoop_ghostlocker_knight_luca-stealer_poet-rat_sliver_snatch.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-25_7562eda6698149f6f80248b7ad6dcae1_frostygoop_ghostlocker_knight_luca-stealer_poet-rat_sliver_snatch.exe
-
Size
7.5MB
-
MD5
7562eda6698149f6f80248b7ad6dcae1
-
SHA1
65317ddc71c388e0e72f279b446173e68a944bf6
-
SHA256
ae0557f58bfbc3e5c984017e97f11dd0b747c50ac02244320d75438d747c5cf2
-
SHA512
1e5f2b0df5c6e51829e1350817775c80039b3ef2490af0131c9094cc3157cd25ed4cb8c03894b9e7c931ccc088a4fae153fef49d702129ab7304780ec789a7fe
-
SSDEEP
98304:yyF4ndoxX4EowTAvVjy0PzV5sy/s7sNEeoBrteaO:rOdoxhwVjyozV5VUwyeaO
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Service 5104 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-03-25_7562eda6698149f6f80248b7ad6dcae1_frostygoop_ghostlocker_knight_luca-stealer_poet-rat_sliver_snatch.exe\"" reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2488 reg.exe 3352 reg.exe 2644 reg.exe 2604 reg.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2488 1512 2025-03-25_7562eda6698149f6f80248b7ad6dcae1_frostygoop_ghostlocker_knight_luca-stealer_poet-rat_sliver_snatch.exe 86 PID 1512 wrote to memory of 2488 1512 2025-03-25_7562eda6698149f6f80248b7ad6dcae1_frostygoop_ghostlocker_knight_luca-stealer_poet-rat_sliver_snatch.exe 86 PID 1512 wrote to memory of 3352 1512 2025-03-25_7562eda6698149f6f80248b7ad6dcae1_frostygoop_ghostlocker_knight_luca-stealer_poet-rat_sliver_snatch.exe 88 PID 1512 wrote to memory of 3352 1512 2025-03-25_7562eda6698149f6f80248b7ad6dcae1_frostygoop_ghostlocker_knight_luca-stealer_poet-rat_sliver_snatch.exe 88 PID 1512 wrote to memory of 2644 1512 2025-03-25_7562eda6698149f6f80248b7ad6dcae1_frostygoop_ghostlocker_knight_luca-stealer_poet-rat_sliver_snatch.exe 90 PID 1512 wrote to memory of 2644 1512 2025-03-25_7562eda6698149f6f80248b7ad6dcae1_frostygoop_ghostlocker_knight_luca-stealer_poet-rat_sliver_snatch.exe 90 PID 1512 wrote to memory of 2604 1512 2025-03-25_7562eda6698149f6f80248b7ad6dcae1_frostygoop_ghostlocker_knight_luca-stealer_poet-rat_sliver_snatch.exe 92 PID 1512 wrote to memory of 2604 1512 2025-03-25_7562eda6698149f6f80248b7ad6dcae1_frostygoop_ghostlocker_knight_luca-stealer_poet-rat_sliver_snatch.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-25_7562eda6698149f6f80248b7ad6dcae1_frostygoop_ghostlocker_knight_luca-stealer_poet-rat_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-25_7562eda6698149f6f80248b7ad6dcae1_frostygoop_ghostlocker_knight_luca-stealer_poet-rat_sliver_snatch.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\system32\reg.exereg query HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /s2⤵
- Modifies registry key
PID:2488
-
-
C:\Windows\system32\reg.exereg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Microsoft Windows Service 5104" /t REG_SZ /d \"C:\Users\Admin\AppData\Local\Temp\2025-03-25_7562eda6698149f6f80248b7ad6dcae1_frostygoop_ghostlocker_knight_luca-stealer_poet-rat_sliver_snatch.exe\" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:3352
-
-
C:\Windows\system32\reg.exereg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run /v "Microsoft Windows Service 5104" /t REG_BINARY /d 020000000000000000000000 /f2⤵
- Modifies registry key
PID:2644
-
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\RunNotification /v "StartupTNotiMicrosoft Windows Service 5104" /t REG_DWORD /d 1 /f2⤵
- Modifies registry key
PID:2604
-