Analysis
-
max time kernel
103s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 16:30
Behavioral task
behavioral1
Sample
2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe
-
Size
10.0MB
-
MD5
ef3d97bc2ee0c97cba2343bf0bb08964
-
SHA1
431317661ec22187b51894d865260c9e46f15c68
-
SHA256
21031c2aaf9d8b9bb527d4056928512899e21c5c2f12cf3c29a0bf757008ed77
-
SHA512
e3fab26b4215131af34f663803261c17a60d8f0e7f8dae324e517320d61cb4632af812206b777e864ac7f85a9036284322e994ac9b05b16bb01744e138f8e130
-
SSDEEP
98304:vJpHIt857719GKtu5RUDINJmDYBC1L2/0XkE:vDqKdujUumDMmR
Malware Config
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\Recovery reagentc.exe File opened for modification C:\Windows\system32\Recovery\ReAgent.xml reagentc.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Logs\ReAgent\ReAgent.log reagentc.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log reagentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml reagentc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml reagentc.exe -
Kills process with taskkill 15 IoCs
pid Process 4184 taskkill.exe 4960 taskkill.exe 4088 taskkill.exe 1528 taskkill.exe 3168 taskkill.exe 772 taskkill.exe 3816 taskkill.exe 3008 taskkill.exe 3180 taskkill.exe 4252 taskkill.exe 2372 taskkill.exe 4444 taskkill.exe 2208 taskkill.exe 216 taskkill.exe 1988 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 3816 taskkill.exe Token: SeDebugPrivilege 4184 taskkill.exe Token: SeDebugPrivilege 4444 taskkill.exe Token: SeDebugPrivilege 3008 taskkill.exe Token: SeDebugPrivilege 2208 taskkill.exe Token: SeDebugPrivilege 216 taskkill.exe Token: SeDebugPrivilege 1988 taskkill.exe Token: SeDebugPrivilege 3180 taskkill.exe Token: SeDebugPrivilege 3168 taskkill.exe Token: SeDebugPrivilege 4960 taskkill.exe Token: SeDebugPrivilege 772 taskkill.exe Token: SeDebugPrivilege 4088 taskkill.exe Token: SeDebugPrivilege 1528 taskkill.exe Token: SeDebugPrivilege 4252 taskkill.exe Token: SeDebugPrivilege 2372 taskkill.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1088 wrote to memory of 3816 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 89 PID 1088 wrote to memory of 3816 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 89 PID 1088 wrote to memory of 4184 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 92 PID 1088 wrote to memory of 4184 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 92 PID 1088 wrote to memory of 4444 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 94 PID 1088 wrote to memory of 4444 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 94 PID 1088 wrote to memory of 3008 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 96 PID 1088 wrote to memory of 3008 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 96 PID 1088 wrote to memory of 2208 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 98 PID 1088 wrote to memory of 2208 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 98 PID 1088 wrote to memory of 216 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 101 PID 1088 wrote to memory of 216 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 101 PID 1088 wrote to memory of 1988 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 104 PID 1088 wrote to memory of 1988 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 104 PID 1088 wrote to memory of 3180 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 106 PID 1088 wrote to memory of 3180 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 106 PID 1088 wrote to memory of 3168 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 108 PID 1088 wrote to memory of 3168 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 108 PID 1088 wrote to memory of 4960 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 110 PID 1088 wrote to memory of 4960 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 110 PID 1088 wrote to memory of 772 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 113 PID 1088 wrote to memory of 772 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 113 PID 1088 wrote to memory of 4088 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 115 PID 1088 wrote to memory of 4088 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 115 PID 1088 wrote to memory of 1528 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 117 PID 1088 wrote to memory of 1528 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 117 PID 1088 wrote to memory of 4252 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 119 PID 1088 wrote to memory of 4252 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 119 PID 1088 wrote to memory of 2372 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 121 PID 1088 wrote to memory of 2372 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 121 PID 1088 wrote to memory of 4776 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 123 PID 1088 wrote to memory of 4776 1088 2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-30_ef3d97bc2ee0c97cba2343bf0bb08964_frostygoop_knight_luca-stealer_poet-rat_sliver_snatch.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\system32\taskkill.exetaskkill /F /IM chrome.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM firefox.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4184
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM brave.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM opera.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM kometa.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM orbitum.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM centbrowser.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM 7star.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM sputnik.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM vivaldi.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM epicprivacybrowser.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM msedge.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM uran.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM yandex.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM iridium.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Windows\system32\reagentc.exereagentc.exe /disable2⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:4776
-