Source: snake.exe |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Yara match |
File source: snake.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.snake.exe.fd0000.0.unpack, type: UNPACKEDPE |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: Joe Sandbox View |
IP Address: 188.114.97.3 188.114.97.3 |
Source: Joe Sandbox View |
IP Address: 188.114.97.3 188.114.97.3 |
Source: Joe Sandbox View |
IP Address: 193.122.6.168 193.122.6.168 |
Source: unknown |
DNS query: name: checkip.dyndns.org |
Source: unknown |
DNS query: name: reallyfreegeoip.org |
Source: Network traffic |
Suricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49733 -> 193.122.6.168:80 |
Source: Network traffic |
Suricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49730 -> 193.122.6.168:80 |
Source: Network traffic |
Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49732 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49736 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49734 -> 188.114.97.3:443 |
Source: Network traffic |
Suricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49740 -> 188.114.97.3:443 |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive |
Source: global traffic |
DNS traffic detected: DNS query: checkip.dyndns.org |
Source: global traffic |
DNS traffic detected: DNS query: reallyfreegeoip.org |
Source: snake.exe, 00000000.00000002.1783268416.0000000003454000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003398000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003446000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.000000000342B000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003490000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003481000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003438000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.com |
Source: snake.exe, 00000000.00000002.1783268416.0000000003454000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003398000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003446000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.000000000342B000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003490000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003481000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003438000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.comd |
Source: snake.exe, 00000000.00000002.1783268416.0000000003454000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003461000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003398000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003446000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.000000000342B000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.000000000338C000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003490000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003481000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003438000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.00000000033DB000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.org |
Source: snake.exe, 00000000.00000002.1783268416.00000000032D1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.org/ |
Source: snake.exe, 00000000.00000002.1783268416.0000000003454000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003461000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003398000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003446000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.000000000342B000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003490000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003438000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.00000000033DB000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.org/d |
Source: snake.exe |
String found in binary or memory: http://checkip.dyndns.org/q |
Source: snake.exe, 00000000.00000002.1783268416.0000000003454000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003398000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003446000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.000000000342B000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003490000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003481000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003438000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://checkip.dyndns.orgd |
Source: snake.exe, 00000000.00000002.1783268416.0000000003454000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003446000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.00000000033B0000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.000000000342B000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003490000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003481000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003438000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://reallyfreegeoip.org |
Source: snake.exe, 00000000.00000002.1783268416.0000000003454000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003446000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.00000000033B0000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.000000000342B000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003490000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003481000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003438000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://reallyfreegeoip.orgd |
Source: snake.exe, 00000000.00000002.1783268416.00000000032D1000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: snake.exe, 00000000.00000002.1783268416.0000000003454000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003398000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003446000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.000000000342B000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003490000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003481000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003438000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.00000000033DB000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://reallyfreegeoip.org |
Source: snake.exe |
String found in binary or memory: https://reallyfreegeoip.org/xml/ |
Source: snake.exe, 00000000.00000002.1783268416.00000000033DB000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33 |
Source: snake.exe, 00000000.00000002.1783268416.0000000003454000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003446000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.000000000342B000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003490000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003481000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.0000000003438000.00000004.00000800.00020000.00000000.sdmp, snake.exe, 00000000.00000002.1783268416.00000000033DB000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$ |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49744 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49732 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49734 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49731 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49742 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49731 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49732 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49740 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49740 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49742 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49744 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49738 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49736 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49736 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49734 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49738 -> 443 |
Source: snake.exe, type: SAMPLE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: snake.exe, type: SAMPLE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: snake.exe, type: SAMPLE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: snake.exe, type: SAMPLE |
Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 0.0.snake.exe.fd0000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 0.0.snake.exe.fd0000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Encrial credential stealer malware Author: Florian Roth |
Source: 0.0.snake.exe.fd0000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects executables with potential process hoocking Author: ditekSHen |
Source: 0.0.snake.exe.fd0000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: 00000000.00000000.1640784495.0000000000FD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: 00000000.00000000.1640784495.0000000000FD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: Process Memory Space: snake.exe PID: 6788, type: MEMORYSTR |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown |
Source: Process Memory Space: snake.exe PID: 6788, type: MEMORYSTR |
Matched rule: Detects Snake Keylogger Author: ditekSHen |
Source: snake.exe, 00000000.00000002.1784378806.0000000006AD8000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameCmd.Exej% vs snake.exe |
Source: snake.exe, 00000000.00000000.1640784495.0000000000FD2000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs snake.exe |
Source: snake.exe, 00000000.00000002.1782887346.000000000160E000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameclr.dllT vs snake.exe |
Source: snake.exe |
Binary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs snake.exe |
Source: snake.exe, type: SAMPLE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: snake.exe, type: SAMPLE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: snake.exe, type: SAMPLE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: snake.exe, type: SAMPLE |
Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 0.0.snake.exe.fd0000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 0.0.snake.exe.fd0000.0.unpack, type: UNPACKEDPE |
Matched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.snake.exe.fd0000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking |
Source: 0.0.snake.exe.fd0000.0.unpack, type: UNPACKEDPE |
Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: 00000000.00000000.1640784495.0000000000FD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: 00000000.00000000.1640784495.0000000000FD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: Process Memory Space: snake.exe PID: 6788, type: MEMORYSTR |
Matched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23 |
Source: Process Memory Space: snake.exe PID: 6788, type: MEMORYSTR |
Matched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger |
Source: snake.exe, --J-.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: snake.exe, --J-.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: snake.exe, -.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: snake.exe, -.cs |
Cryptographic APIs: 'TransformFinalBlock' |
Source: classification engine |
Classification label: mal92.troj.winEXE@6/1@2/2 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6100:120:WilError_03 |
Source: C:\Users\user\Desktop\snake.exe |
Mutant created: NULL |
Source: snake.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: snake.exe |
ReversingLabs: Detection: 91% |
Source: snake.exe |
Virustotal: Detection: 82% |
Source: unknown |
Process created: C:\Users\user\Desktop\snake.exe "C:\Users\user\Desktop\snake.exe" |
|
Source: C:\Users\user\Desktop\snake.exe |
Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\snake.exe" |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3 |
|
Source: C:\Users\user\Desktop\snake.exe |
Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\snake.exe" |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: mscoree.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: vcruntime140_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: ucrtbase_clr0400.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: rasapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: rasman.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: rtutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: dhcpcsvc6.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: dhcpcsvc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\SysWOW64\choice.exe |
Section loaded: version.dll |
Jump to behavior |
Source: snake.exe |
Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: C:\Users\user\Desktop\snake.exe |
Process created: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\snake.exe" |
|
Source: C:\Users\user\Desktop\snake.exe |
Process created: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\snake.exe" |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Memory allocated: 1820000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Memory allocated: 32D0000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Memory allocated: 52D0000 memory reserve | memory write watch |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 600000 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599875 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599765 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599655 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599547 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599437 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599328 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599218 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599109 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599000 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598890 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598781 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598672 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598562 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598453 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598343 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598234 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598125 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598015 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597891 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597765 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597656 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597543 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597437 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597328 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597218 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597109 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597000 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596890 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596781 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596672 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596562 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596453 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596343 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596234 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596125 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596015 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595906 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595797 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595687 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595578 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595465 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595358 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595244 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595130 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595014 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 594902 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 594797 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 594687 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 594578 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep count: 33 > 30 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -30437127721620741s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -600000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -599875s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7052 |
Thread sleep count: 8067 > 30 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7052 |
Thread sleep count: 1792 > 30 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -599765s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -599655s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -599547s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -599437s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -599328s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -599218s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -599109s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -599000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -598890s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -598781s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -598672s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -598562s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -598453s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -598343s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -598234s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -598125s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -598015s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -597891s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -597765s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -597656s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -597543s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -597437s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -597328s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -597218s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -597109s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -597000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -596890s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -596781s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -596672s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -596562s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -596453s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -596343s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -596234s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -596125s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -596015s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -595906s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -595797s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -595687s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -595578s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -595465s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -595358s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -595244s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -595130s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -595014s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -594902s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -594797s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -594687s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe TID: 7056 |
Thread sleep time: -594578s >= -30000s |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 922337203685477 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 600000 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599875 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599765 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599655 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599547 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599437 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599328 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599218 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599109 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 599000 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598890 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598781 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598672 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598562 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598453 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598343 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598234 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598125 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 598015 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597891 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597765 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597656 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597543 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597437 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597328 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597218 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597109 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 597000 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596890 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596781 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596672 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596562 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596453 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596343 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596234 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596125 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 596015 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595906 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595797 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595687 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595578 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595465 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595358 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595244 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595130 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 595014 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 594902 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 594797 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 594687 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Thread delayed: delay time: 594578 |
Jump to behavior |
Source: snake.exe, 00000000.00000002.1782919660.0000000001679000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll |
Source: C:\Users\user\Desktop\snake.exe |
Process created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\snake.exe" |
Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe |
Process created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3 |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Queries volume information: C:\Users\user\Desktop\snake.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\snake.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation |
Jump to behavior |
Source: Yara match |
File source: snake.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.snake.exe.fd0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1640784495.0000000000FD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1783268416.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: snake.exe PID: 6788, type: MEMORYSTR |
Source: Yara match |
File source: snake.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.snake.exe.fd0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1640784495.0000000000FD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: snake.exe PID: 6788, type: MEMORYSTR |
Source: Yara match |
File source: snake.exe, type: SAMPLE |
Source: Yara match |
File source: 0.0.snake.exe.fd0000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000000.00000000.1640784495.0000000000FD2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.1783268416.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: snake.exe PID: 6788, type: MEMORYSTR |