Analysis
-
max time kernel
101s -
max time network
106s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2025, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe
Resource
win11-20250410-en
General
-
Target
2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe
-
Size
10.3MB
-
MD5
d9aee7cf0002606edf948d6b38c357e7
-
SHA1
eae81579f6057c1f016a61932c64e90d3813a1e9
-
SHA256
ed04e4a49975567e121f24d5727ae26bd04c30ab4d9a99897f84b3a87cf9b40e
-
SHA512
2f2c978e28595dd07e94a32521897f1b144fce12be3e5386e513d8bb7c99e2a82bfeb5d7af40d43cd96b88018b3a1d069cf1a3c3051f367e1165a4f2048d82be
-
SSDEEP
98304:QVghEwZ0/kg7oWvjfx/OdWcA0rU0UhkE1bl:QuhEU0/Bjfx/OdWHLd1bl
Malware Config
Signatures
-
Skuld family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\SecurityHealthSystray.exe" 2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3696 2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3696 wrote to memory of 3428 3696 2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe 78 PID 3696 wrote to memory of 3428 3696 2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe 78 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3428 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Local\Temp\2025-04-17_d9aee7cf0002606edf948d6b38c357e7_frostygoop_knight_luca-stealer_ngrbot_poet-rat_sliver_snatch.exe2⤵
- Views/modifies file attributes
PID:3428
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe1⤵PID:3044
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.3MB
MD5d9aee7cf0002606edf948d6b38c357e7
SHA1eae81579f6057c1f016a61932c64e90d3813a1e9
SHA256ed04e4a49975567e121f24d5727ae26bd04c30ab4d9a99897f84b3a87cf9b40e
SHA5122f2c978e28595dd07e94a32521897f1b144fce12be3e5386e513d8bb7c99e2a82bfeb5d7af40d43cd96b88018b3a1d069cf1a3c3051f367e1165a4f2048d82be