Analysis
-
max time kernel
106s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2025, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe
Resource
win11-20250410-en
General
-
Target
2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe
-
Size
10.3MB
-
MD5
d9aee7cf0002606edf948d6b38c357e7
-
SHA1
eae81579f6057c1f016a61932c64e90d3813a1e9
-
SHA256
ed04e4a49975567e121f24d5727ae26bd04c30ab4d9a99897f84b3a87cf9b40e
-
SHA512
2f2c978e28595dd07e94a32521897f1b144fce12be3e5386e513d8bb7c99e2a82bfeb5d7af40d43cd96b88018b3a1d069cf1a3c3051f367e1165a4f2048d82be
-
SSDEEP
98304:QVghEwZ0/kg7oWvjfx/OdWcA0rU0UhkE1bl:QuhEU0/Bjfx/OdWHLd1bl
Malware Config
Signatures
-
Skuld family
-
Executes dropped EXE 1 IoCs
pid Process 2440 SecurityHealthSystray.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3833542908-3750648139-3436651901-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\SecurityHealthSystray.exe" 2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2248 2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe Token: SeDebugPrivilege 2440 SecurityHealthSystray.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2248 wrote to memory of 4068 2248 2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe 85 PID 2248 wrote to memory of 4068 2248 2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe 85 PID 3516 wrote to memory of 2440 3516 cmd.exe 89 PID 3516 wrote to memory of 2440 3516 cmd.exe 89 PID 2440 wrote to memory of 3304 2440 SecurityHealthSystray.exe 91 PID 2440 wrote to memory of 3304 2440 SecurityHealthSystray.exe 91 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3304 attrib.exe 4068 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Local\Temp\2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe2⤵
- Views/modifies file attributes
PID:4068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe3⤵
- Views/modifies file attributes
PID:3304
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.3MB
MD5d9aee7cf0002606edf948d6b38c357e7
SHA1eae81579f6057c1f016a61932c64e90d3813a1e9
SHA256ed04e4a49975567e121f24d5727ae26bd04c30ab4d9a99897f84b3a87cf9b40e
SHA5122f2c978e28595dd07e94a32521897f1b144fce12be3e5386e513d8bb7c99e2a82bfeb5d7af40d43cd96b88018b3a1d069cf1a3c3051f367e1165a4f2048d82be