Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 16:38
Behavioral task
behavioral1
Sample
2025-03-26_5f6625d8f97fc1289a38abd4633946dc_frostygoop_poet-rat_sliver_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-26_5f6625d8f97fc1289a38abd4633946dc_frostygoop_poet-rat_sliver_snatch.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-26_5f6625d8f97fc1289a38abd4633946dc_frostygoop_poet-rat_sliver_snatch.exe
-
Size
11.1MB
-
MD5
5f6625d8f97fc1289a38abd4633946dc
-
SHA1
66ed6aa6a95307af7be1b1f21995fd8dd49fa509
-
SHA256
5d8210c47f17ca50c30293095eb09cf749f500179e55c9893134de01e73114b0
-
SHA512
b554b43e625e42c56355d488ac0dd0dfda9416edc2d8828926fd8564ce192e924af34dfc3e208632470301d3c000defd2fb86b2a969e834387342156043855ec
-
SSDEEP
98304:+b9TDv2Qd7G/HaMLeov6bMqpV4d8m1tfi3IcuSOD/0x:W2vym61A
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2972 2924 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-26_5f6625d8f97fc1289a38abd4633946dc_frostygoop_poet-rat_sliver_snatch.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2972 2924 2025-03-26_5f6625d8f97fc1289a38abd4633946dc_frostygoop_poet-rat_sliver_snatch.exe 31 PID 2924 wrote to memory of 2972 2924 2025-03-26_5f6625d8f97fc1289a38abd4633946dc_frostygoop_poet-rat_sliver_snatch.exe 31 PID 2924 wrote to memory of 2972 2924 2025-03-26_5f6625d8f97fc1289a38abd4633946dc_frostygoop_poet-rat_sliver_snatch.exe 31 PID 2924 wrote to memory of 2972 2924 2025-03-26_5f6625d8f97fc1289a38abd4633946dc_frostygoop_poet-rat_sliver_snatch.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-26_5f6625d8f97fc1289a38abd4633946dc_frostygoop_poet-rat_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-26_5f6625d8f97fc1289a38abd4633946dc_frostygoop_poet-rat_sliver_snatch.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 362⤵
- Program crash
PID:2972
-