Analysis
-
max time kernel
104s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 16:22
Behavioral task
behavioral1
Sample
2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe
-
Size
10.0MB
-
MD5
ef3d97bc2ee0c97cba2343bf0bb08964
-
SHA1
431317661ec22187b51894d865260c9e46f15c68
-
SHA256
21031c2aaf9d8b9bb527d4056928512899e21c5c2f12cf3c29a0bf757008ed77
-
SHA512
e3fab26b4215131af34f663803261c17a60d8f0e7f8dae324e517320d61cb4632af812206b777e864ac7f85a9036284322e994ac9b05b16bb01744e138f8e130
-
SSDEEP
98304:vJpHIt857719GKtu5RUDINJmDYBC1L2/0XkE:vDqKdujUumDMmR
Malware Config
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\Recovery reagentc.exe File opened for modification C:\Windows\system32\Recovery\ReAgent.xml reagentc.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml reagentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml reagentc.exe File opened for modification C:\Windows\Logs\ReAgent\ReAgent.log reagentc.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log reagentc.exe -
Kills process with taskkill 15 IoCs
pid Process 2340 taskkill.exe 2716 taskkill.exe 3896 taskkill.exe 2956 taskkill.exe 4648 taskkill.exe 4340 taskkill.exe 2960 taskkill.exe 2116 taskkill.exe 2604 taskkill.exe 3660 taskkill.exe 1864 taskkill.exe 1408 taskkill.exe 3364 taskkill.exe 4436 taskkill.exe 3992 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 3364 taskkill.exe Token: SeDebugPrivilege 3896 taskkill.exe Token: SeDebugPrivilege 2116 taskkill.exe Token: SeDebugPrivilege 2956 taskkill.exe Token: SeDebugPrivilege 4648 taskkill.exe Token: SeDebugPrivilege 2340 taskkill.exe Token: SeDebugPrivilege 4340 taskkill.exe Token: SeDebugPrivilege 2960 taskkill.exe Token: SeDebugPrivilege 4436 taskkill.exe Token: SeDebugPrivilege 3992 taskkill.exe Token: SeDebugPrivilege 2604 taskkill.exe Token: SeDebugPrivilege 3660 taskkill.exe Token: SeDebugPrivilege 2716 taskkill.exe Token: SeDebugPrivilege 1864 taskkill.exe Token: SeDebugPrivilege 1408 taskkill.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 5100 wrote to memory of 3364 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 88 PID 5100 wrote to memory of 3364 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 88 PID 5100 wrote to memory of 3896 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 91 PID 5100 wrote to memory of 3896 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 91 PID 5100 wrote to memory of 2116 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 93 PID 5100 wrote to memory of 2116 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 93 PID 5100 wrote to memory of 2956 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 95 PID 5100 wrote to memory of 2956 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 95 PID 5100 wrote to memory of 4648 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 97 PID 5100 wrote to memory of 4648 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 97 PID 5100 wrote to memory of 2340 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 99 PID 5100 wrote to memory of 2340 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 99 PID 5100 wrote to memory of 4340 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 101 PID 5100 wrote to memory of 4340 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 101 PID 5100 wrote to memory of 2960 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 103 PID 5100 wrote to memory of 2960 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 103 PID 5100 wrote to memory of 4436 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 105 PID 5100 wrote to memory of 4436 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 105 PID 5100 wrote to memory of 3992 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 107 PID 5100 wrote to memory of 3992 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 107 PID 5100 wrote to memory of 2604 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 110 PID 5100 wrote to memory of 2604 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 110 PID 5100 wrote to memory of 3660 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 113 PID 5100 wrote to memory of 3660 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 113 PID 5100 wrote to memory of 2716 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 115 PID 5100 wrote to memory of 2716 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 115 PID 5100 wrote to memory of 1864 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 118 PID 5100 wrote to memory of 1864 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 118 PID 5100 wrote to memory of 1408 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 120 PID 5100 wrote to memory of 1408 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 120 PID 5100 wrote to memory of 5060 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 122 PID 5100 wrote to memory of 5060 5100 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\system32\taskkill.exetaskkill /F /IM chrome.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM firefox.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM brave.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM opera.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM kometa.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM orbitum.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM centbrowser.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM 7star.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM sputnik.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM vivaldi.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM epicprivacybrowser.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM msedge.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM uran.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM yandex.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM iridium.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
C:\Windows\system32\reagentc.exereagentc.exe /disable2⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:5060
-